US9411956B2 - Locked print with intruder detection and management - Google Patents

Locked print with intruder detection and management Download PDF

Info

Publication number
US9411956B2
US9411956B2 US12/166,999 US16699908A US9411956B2 US 9411956 B2 US9411956 B2 US 9411956B2 US 16699908 A US16699908 A US 16699908A US 9411956 B2 US9411956 B2 US 9411956B2
Authority
US
United States
Prior art keywords
data
printing device
user identification
locked
print data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/166,999
Other versions
US20100002249A1 (en
Inventor
Jayasimha Nuggehalli
Seiichi Katano
Seong Kim
Ke Wei
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ricoh Co Ltd
Original Assignee
Ricoh Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ricoh Co Ltd filed Critical Ricoh Co Ltd
Priority to US12/166,999 priority Critical patent/US9411956B2/en
Assigned to RICOH COMPANY, LTD. reassignment RICOH COMPANY, LTD. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: WEI, KE, KIM, SEONG, KATANO, SEIICHI, NUGGEHALLI, JAYASIMHA
Priority to EP09164263A priority patent/EP2141631A3/en
Priority to JP2009156816A priority patent/JP2010012785A/en
Publication of US20100002249A1 publication Critical patent/US20100002249A1/en
Priority to US15/202,853 priority patent/US9894246B2/en
Application granted granted Critical
Publication of US9411956B2 publication Critical patent/US9411956B2/en
Priority to US15/387,330 priority patent/US9729758B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/4413Restricting access, e.g. according to user identity involving the use of passwords, ID codes or the like, e.g. PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00026Methods therefor
    • H04N1/00037Detecting, i.e. determining the occurrence of a predetermined state
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00002Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for
    • H04N1/00071Diagnosis, testing or measuring; Detecting, analysing or monitoring not otherwise provided for characterised by the action taken
    • H04N1/00074Indicating or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/0035User-machine interface; Control console
    • H04N1/00405Output means
    • H04N1/00408Display of information to the user, e.g. menus
    • H04N1/00411Display of information to the user, e.g. menus the display also being used for user input, e.g. touch screen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/4406Restricting access, e.g. according to user identity
    • H04N1/444Restricting access, e.g. according to user identity to a particular document or image or part thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0094Multifunctional device, i.e. a device capable of all of reading, reproducing, copying, facsimile transception, file transception

Definitions

  • This invention relates generally to printing of electronic documents.
  • Some printing devices are configured with a feature known as “locked printing” to provide control over the printing of electronic documents.
  • locked printing When a printing device is configured with a locked printing feature and print data is sent to the printing device, a printed version of an electronic document reflected in the print data is not generated until a user is verified at the printing device.
  • a user enters authentication data, such as a password, through an operation panel on the printing device. The printing device verifies the authentication data and if the authentication data is successfully verified, allows a printed version of the electronic document reflected in the print data to be generated, i.e., printed.
  • Locke print documents are conventionally stored on a printing device until an authorized user prints the locked print electronic documents. During that time, an unauthorized third party may attempt to enter valid authentication data and gain access to the locked print data stored on the printing device. This is particularly problematic in situations where the locked print data contains sensitive information.
  • a printing device includes a user interface, a print module and a locked print module.
  • the user interface is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device.
  • the locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If locked printing is specified for any of the electronic documents contained in the plurality of print data, then the corresponding print data is stored on the printing device and not processed for printing.
  • the locked print module is further configured to verify password data with respect to user identification data received via the user interface.
  • the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
  • the locked print module is also configured to verify multiple passwords for particular user identification data and if at least a specified number of the passwords are not able to be verified, then the locked print module causes the print data to be deleted from the printing device. This allows for accidental entering of incorrect password data without causing the deletion of print data.
  • the print data selected for deletion may be associated with only the user identification data, or the print data may be associated with both the user identification data and other user identification data from a plurality of user identification data.
  • the locked print module may also cause the user identification data to be deleted from the printing device.
  • the locked print module may also cause one or more notifications to be generated and transmitted that indicate that the verification of the password data with respect to the user identification data was not successful.
  • a printing device comprises a user interface, a print module and a locked print module.
  • the user interface is configured to display information to users and receive user input from the users.
  • the print module is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device.
  • the locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If, for any of the print data from the plurality of print data, locked printing is specified for the electronic document contained in the print data, then the locked print module causes the print data to be stored at the printing device instead of being processed for printing.
  • the locked print module verifies the password data with respect to the user identification data. If the password data is successfully verified with respect to the user identification data, then the locked print module allows user access to print data associated with the user identification data. If the password data is not successfully verified with respect to the user identification data, then the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
  • FIG. 1 is a block diagram that depicts an arrangement for printing policy-enabled electronic documents using locked printing according to an embodiment of the invention.
  • FIG. 2 is a block diagram that depicts an example implementation of locked print module, according to one embodiment of the invention.
  • FIG. 3 is a flow diagram that depicts an approach for printing a policy-enabled electronic document using locked printing, according to one embodiment of the invention
  • FIGS. 4A-4C depict an example graphical user interface that may be displayed on a user interface of a printing device.
  • FIG. 5 is a block diagram that depicts a job table that may be included in or stored in association with locked print data.
  • FIG. 6 is a flow diagram that depicts an approach for processing locked print data with intruder detection and management, according to one embodiment of the invention.
  • FIG. 7 is a block diagram of a computer system on which embodiments of the invention may be implemented.
  • a printing device includes a user interface, a print module and a locked print module.
  • the user interface is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device.
  • the locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If locked printing is specified for any of the electronic documents contained in the plurality of print data, then the corresponding print data is stored on the printing device and not processed for printing.
  • the locked print module is further configured to verify password data with respect to user identification data received via the user interface.
  • the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
  • the locked print module is also configured to verify multiple passwords for particular user identification data and if at least a specified number of the passwords are not able to be verified, then the locked print module causes the print data to be deleted from the printing device. This allows for accidental entering of incorrect password data without causing the deletion of print data.
  • the print data selected for deletion may be associated with only the user identification data, or the print data may be associated with both the user identification data and other user identification data from a plurality of user identification data.
  • the locked print module may also cause the user identification data to be deleted from the printing device.
  • the locked print module may also cause one or more notifications to be generated and transmitted that indicate that the verification of the password data with respect to the user identification data was not successful.
  • This approach provides additional protection of locked print data, which is particularly useful in situations where locked print data contains sensitive or confidential information.
  • FIG. 1 is a block diagram that depicts an arrangement 100 for implementing locked printing on a printing device that includes intruder detection and management, according to an embodiment of the invention.
  • Arrangement 100 includes client devices 102 , 104 and a printing device 106 communicatively coupled via a network 108 .
  • Client devices 102 , 104 may be implemented by any type of client device.
  • Example implementations of client devices 102 , 104 include, without limitation, workstations, personal computers, laptop computers, personal digital assistants (PDAs), cellular telephony devices and any type of mobile devices.
  • client device 102 is configured with an application 110 and a print driver 112 .
  • Application 110 may be any type of application process. Examples of application 110 include, without limitation, a word processor, a spreadsheet program and an email client.
  • Print driver 112 is configured to provide a user interface for a user to specify that locked printing is to be used to print particular print data.
  • Print driver 112 is also configured to process data from application 110 and generate print data that is provided to printing device 106 for processing. Thus, application 110 and print driver 112 operate together to generate and provide print data to printing device 106 .
  • client device 104 is a generic client device. Client devices 102 , 104 may be configured with other mechanisms, processes and functionality, depending upon a particular implementation.
  • Printing device 106 may be implemented by any type of device that is capable of processing print data and generating printed versions of electronic documents reflected in the print data.
  • printing device 106 includes a user interface 114 , a print module 116 , a locked print module 118 and storage 120 .
  • Printing device 106 may be configured with other mechanisms, processes and functionality, depending upon a particular implementation, and the approach described herein for implementing locked printing on a printing device is not limited to any particular type of printing device 106 .
  • printing device 106 may be a multi-function peripheral (MFP) that includes any combination of printing, copying, facsimile and scanning capability, etc.
  • MFP multi-function peripheral
  • User interface 114 may be any mechanism and/or medium that provides for the exchange of information between a user and printing device 106 .
  • Examples of user interface 114 include, without limitation, a control panel with a display and keypad or keyboard, a cathode ray tube (CRT), a liquid crystal display (LCD), a keyboard, touchpad, mouse, trackball, a microphone and speakers, and any combination thereof.
  • Printing device 106 may be configured to display information on user interface 114 in any number of languages, depending upon a particular implementation. As with conventional printing devices, the user interface 114 on printing device 106 may provide limited capability to easily enter alphanumeric strings.
  • Print module 116 may be implemented by one or more processes for processing print data received from client device 104 and for generating a printed version of an electronic document reflected in the print data.
  • Print module 116 and locked print module 118 may be implemented as resident processes on printing device 106 .
  • print module 116 and locked print module 118 may be made available to printing device 106 on a removable media or may be implemented at a remote location with respect to printing device 106 .
  • Locked print module may be implemented by one or more processes for providing locked print services on printing device 106 .
  • Storage 120 may be implemented by any type of storage, including volatile storage, non-volatile storage, or any combination of volatile and non-volatile storage. Examples of storage 120 include, without limitation, random access memory (RAM) and one or more disks.
  • RAM random access memory
  • Network 108 may be implemented by any type of medium and/or mechanism (wired or wireless) that facilitates the exchange of information between client device 104 , printing device 106 and client device 104 . Furthermore, network 108 may use any type of communications protocol and may be secured or unsecured, depending upon the requirements of a particular application.
  • FIG. 1 The components and processes depicted in FIG. 1 and described herein may be implemented in hardware, software, or any combination of hardware or software, depending upon a particular implementation.
  • FIG. 2 is a block diagram that depicts an example implementation of a printing device 200 , according to another embodiment of the invention.
  • printing device 200 includes a network control system (NCS) 202 that performs initial processing of print data received by printing device 200 .
  • NCS 202 includes a print module 204 .
  • Printing device 200 includes a user interface module 206 that may include, for example, an operation panel and supporting hardware and software.
  • the user interface module 206 is configured to display information to users and receive user input from users, for example, via a keypad, function buttons, touchpad, etc.
  • User interface module 206 includes controls that allow a user to enter authentication data. For example, a user may select a user ID assigned to them and then enter a password associated with their user ID.
  • User interface module 206 also includes controls for allowing a user to select locked print data for printing. As described in more detail hereinafter, once a user has been authenticated, the user is given access to locked print data associated with that user. For example, a list of print jobs or electronic documents associated with the user (via the user ID) may be displayed on a user interface and the user is allowed to select one or more of the print jobs or electronic documents for printing.
  • Printing device 202 includes a print system 208 that is configured with language parsers, rasterization and engine control modules.
  • a job filter/encryption module 210 encrypts and/or decrypts print data and is also configured to examine print data to determine whether locked printing is specified for electronic documents contained in the print data. If locked printing is not specified for an electronic document contained in print data, then the print data is processed by print module 204 and the electronic document is printed. If locked printing is specified for an electronic document contained in print data, then the print data is stored to storage 212 instead of being immediately processed by print module 204 . As depicted in FIG. 2 , storage 212 includes locked print data 214 and authentication data 216 .
  • the locked print data 214 is print data that has been designated as locked print data and is therefore stored on storage 212 instead of being immediately printed.
  • the authentication data 216 is data used to authenticate users for providing access to locked print data 214 .
  • the authorization data 216 may include, for example, user ID/password pairs.
  • the authorization data 216 may also indicate locked print data 214 associated with each user ID.
  • a Web configuration module 218 allows a user, such as an administrator, to configure locked print functionality on printing device 200 .
  • FIG. 3 is a flow diagram 300 that depicts an approach for printing an electronic document using locked printing.
  • a user initiates locked printing of an electronic document.
  • a user of client device 102 initiates printing of an electronic document via application 110 and designates locked printing for the electronic document, e.g., via a checkbox or other options in a printing dialog box.
  • print data is generated by print driver 112 and the print data indicates that the electronic document reflected in the print data is a locked print electronic document.
  • the print data may include one or more Print Job Language (PJL) or Page Descriptor Language (PDL) commands that specify that the electronic document is a locked print electronic document.
  • PJL Print Job Language
  • PDL Page Descriptor Language
  • the client device 102 transmits the print data to the printing device 106 over network 108 .
  • the print data may be transmitted to a particular port.
  • the printing data may be transmitted to a particular Transport Control Protocol (TCP) port, such as port 9100 or 515 as two possible examples, to cause locked print module 118 to receive and process the print data.
  • TCP Transport Control Protocol
  • the print data may simply be sent to the printing device 106 and an operating system routine or other routine forwards the print data to locked print module 118 for processing.
  • the data indicating that an electronic document is a locked print electronic document may be contained in a header portion of the print data, in the body portion of the print data, or any combination of a header portion and body portion of the print data.
  • the application program that generates the print data in conjunction with a print driver may create a header that is appended to the print data and the header contains one or more commands that indicate that the electronic document contained in the print data is a locked print electronic document. In FIG.
  • the locked print module 118 examines the print data to determine whether the electronic document in the print data is a locked print electronic document.
  • the NCS 202 passes the print data to the print system 208 , which interprets the print commands contained in the print data.
  • the print system 208 passes the print data to the job filter/encryption module 210 that examines the print data to determine whether the electronic document reflected in the print data is a locked print electronic document.
  • step 310 if the electronic document reflected in the print data is a locked print electronic document, then the print data is stored on the printing device and not immediately processed for printing.
  • the locked print data 122 is stored on storage 120 .
  • the locked print data 214 is stored on storage 212 .
  • a user requests access to locked print jobs stored on the printing device and is authenticated.
  • a user may select a locked print jobs button or icon on user interface 114 to request access to locked print jobs stored on printing device 106 .
  • the user is queried for user credential data, such as a user ID and password.
  • FIG. 4A depicts an example graphical user interface that may be displayed on user interface 114 . This graphical user interface allows a user to select from a list of specified user names.
  • FIG. 4B depicts an example graphical user interface screen for querying the user for a password for the selected user ID.
  • the user credential data entered by the user in this example a user ID and password, is then authenticated.
  • locked print module 118 may be configured to authenticate the user credential data based upon data stored locally on storage 120 . This may include, for example, comparing a user ID and password pair specified in the user credential data to a list of verified user ID/password pairs. As another example, a one-way hash function may be used to generate a result based upon the user ID/password pair specified in the authentication data. The result may then be compared to a list of verified results. These are just two examples of how authentication of the user credential data may be performed and the invention is not limited to any particular authentication mechanism or approach. Instead of authenticating the user credential data locally on printing device 106 , the user credential data may be authenticated remotely with respect to printing device 106 .
  • locked print module 118 may cause the user credential data to be transmitted to another location, e.g., an authentication server over network 108 , for authentication. Locked print module 118 receives a return indication from the other location indicating whether the authentication data was verified.
  • user interface module 206 may be configured to verify the user credential data entered by a user via user interface module 206 using the authentication data 216 stored on storage 212 .
  • FIG. 5 is a block diagram that depicts a job table 500 that may be included in or stored in association with locked print data 214 .
  • the job table 500 includes N number of rows of data, where each row corresponds to a print data, i.e., a print job, stored on printing device 106 , or 200 .
  • the print job data contained in job table 500 includes, for each print job, a JOB ID, which is data that identifies the print job and user authentication data, in the form of a USER ID and PASSWORD.
  • the USER ID and PASSWORD are used to authenticate a user at printing device 106 or 200 .
  • each print job has one associated user, it is possible for multiple users to be associated with a print job so that they can each print the print job.
  • the print job data also includes a TIMESTAMP, which is data that indicates a time at which the print data was generated, and a JOB NAME.
  • the print job data also includes a PAGE COUNT, which indicates the number of pages in the print data, and a PRINT COUNT, which indicates a number of times that the print data has been printed.
  • the print job table 500 may include fewer columns of data or additional columns of data for each print job, depending upon a particular implementation, and the approach is not limited to any particular print job data.
  • the print job data contained in job table 500 may be arranged and formatted in a wide variety of ways and is not limited to the example table arrangement depicted in FIG. 5 .
  • Print data may be arranged on the user interface 114 , for example, sorted by name or in an order in which the print data was received by printing device 106 .
  • the graphical user interface may also include one or more user interface objects that allow a user to select one or more print data to be processed at printing device 106 and one or more actions to be performed on those print data. For example, a user may select a user interface object associated with particular print data and then select a user interface object associated with a printing or deleting function to cause the particular print data to be processed accordingly.
  • Users may be given different types of access to locked print data, depending upon a particular implementation. For example, users may be given access to only the print data that they generated.
  • FIG. 4C depicts an example user interface screen that displays locked print jobs and provides controls for printing and deleting the locked print jobs.
  • step 316 the user selects a locked print electronic document to be processed and one or more actions to be performed on the print data.
  • the user selects a locked print electronic document for printing and in step 318 , the selected electronic document is printed.
  • FIG. 6 is a flow diagram 600 that depicts an approach for processing locked print data with intruder detection and management, according to one embodiment of the invention.
  • a user selects or enters a user ID. For example, a list of users may be displayed on user interface 114 and the user selects a particular user from the list using a touchpad or other user interface controls. Alternatively, the user may enter a user ID via user interface 114 , for example via a keyboard or keypad.
  • a fail count is reset for the user ID selected or entered by the user. The fail count may be a value stored in a variable and maintained by locked print module 118 .
  • the printing device 106 receives a password from the user. For example, a user may enter the password via a keyboard, keypad or other user interface controls.
  • step 608 a determination is made whether the entered password is correct for the user ID that was selected or entered by the user. This determination may be made, for example, by comparing the user ID and password entered by the user to user ID and password data stored on the printing device 106 .
  • the user ID and password data may be stored in job table 500 as previously described, with other data, or separately, depending upon a particular implementation. If, in step 608 , the entered password matches the password stored on the printing device 106 for the user ID, then the user is considered to be successfully authorized and in step 610 , a list of print data that corresponds to the user ID is displayed on user interface 114 .
  • the print data that corresponds to the user ID may be determined, for example, by examining job table 500 .
  • the locked print module 118 examines job table 500 to identify print data that has a corresponding user ID of USER 1 .
  • user ID USER 1 is associated with job 01 , so this print data is displayed on user interface 114 .
  • a user selection of print data is received.
  • the user selection indicates one or more print data that the user selects for printing.
  • the user may select one or more print data via user interface 114 .
  • the selected print data is printed.
  • step 608 a determination is made that the password is not correct for the user ID
  • step 616 a fail count for the user ID is incremented.
  • step 618 a determination is made whether the current fail count is equal to a maximum fail count. If not, then control returns to step 606 and another password may be entered. This password is then verified in step 608 and if the password is correct for the user ID, then steps 610 - 614 are performed. If the password is not correct for the user ID, then in step 616 , the fail count is again incremented and in step 618 , checked against the maximum fail count.
  • step 618 If in step 618 a determination is made that the fail count is equal to the maximum fail count, then it is likely that someone is attempting to determine the correct password for a particular user ID, e.g., by entering in several best guesses at the password.
  • step 620 the user ID, password and corresponding print data are deleted from the printing device 106 so that the unauthorized third party cannot gain access to the locked print data.
  • the determination of the print data that corresponds to the user ID may be made, for example, by examining job table 500 to identify print data associated with the user ID.
  • the print data that includes the user ID for which the fail count was satisfied is deleted from the printing device 106 .
  • Embodiments of the invention have been described herein and depicted in the figures in the context of a one-to-one relationship between user IDs and print data. That is, that each locked print document stored on a printing device has one associated user ID that is used to determine access to the locked print documents.
  • print data may be associated with multiple user IDs. For example, suppose that a user A creates an electronic document that contains sensitive information and decides to use locked printing to provide better control over the printing of the electronic document.
  • the application program that user A uses to create the electronic document allows multiple locked print recipients to be specified. For example, user A might indicate that user B and user C are also authorized to access the electronic document.
  • any of user A, user B or user C may enter their user ID and password at the printing device to obtain access to and print the electronic document.
  • the printing device detects that an incorrect password has been entered for the user ID of user A at least a specified number of times, then the print data associated with the user ID of user A is deleted from the printing device, along with the user ID and password data for user A.
  • the printing device detects that the fail count for the particular user ID equals the maximum fail count value, indicating detection of an intruder, then print data that is associated with only the particular user ID is deleted from the printing device.
  • the particular user ID and corresponding password are also deleted. In this situation, print data that was associated with only the particular user ID is no longer accessible. Print data that is associated with the particular user ID and other user IDs is not deleted from the printing device and is accessible by the users associated with the other user IDS. The particular user ID cannot be used because it (and the corresponding password) have been deleted from the printing device. As an alternative to the foregoing, for additional security, all print data associated with the particular user ID may be deleted from the printing device, irrespective of whether the print data is also associated with other user IDs.
  • the maximum fail count used to trigger the deletion of the user ID and corresponding print data from the printing device 106 may be set to different values depending upon a particular implementation.
  • the maximum fail count may be set to a value that allows for normal data entry errors, but provides protection against repeated attempts to enter a password for a user ID, which may be indicative of an unauthorized third party attempting to gain access.
  • One example maximum fail count value is three. Thus, if three incorrect passwords are consecutively entered for a particular user ID, then both the particular user ID and all print data associated with the particular user ID is deleted from printing device 106 .
  • a global maximum fail count value may be used for all user IDs, or individual maximum fail count values may be used for each user ID, depending upon a particular implementation.
  • the fail count values may be specified by administrative personnel, for example via web configuration module 218 , and stored on storage 212 . In step 622 , optional reporting may be performed, as described in more detail hereinafter.
  • a printing device is further configured to provide notification of intruder detections.
  • the notification may take many forms.
  • a notification may be provided via the user interface 114 of printing device 106 .
  • a notification may be provided via email.
  • the notification may include information about the intruder detection.
  • the notification may indicate the user ID and the number of failed attempts, which is typically the maximum fail count value.
  • FIG. 7 is a block diagram that depicts an example computer system 700 upon which embodiments of the invention may be implemented.
  • Computer system 700 includes a bus 702 or other communication mechanism for communicating information, and a processor 704 coupled with bus 702 for processing information.
  • Computer system 700 also includes a main memory 706 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 702 for storing information and instructions to be executed by processor 704 .
  • Main memory 706 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 704 .
  • RAM random access memory
  • Computer system 700 further includes a read only memory (ROM) 708 or other static storage device coupled to bus 702 for storing static information and instructions for processor 704 .
  • ROM read only memory
  • a storage device 710 such as a magnetic disk or optical disk, is provided and coupled to bus 702 for storing information and instructions.
  • Computer system 700 may be coupled via bus 702 to a display 712 , such as a cathode ray tube (CRT), for displaying information to a computer user.
  • a display 712 such as a cathode ray tube (CRT)
  • An input device 714 is coupled to bus 702 for communicating information and command selections to processor 704 .
  • cursor control 716 is Another type of user input device
  • cursor control 716 such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 704 and for controlling cursor movement on display 712 .
  • This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
  • the invention is related to the use of computer system 700 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 700 in response to processor 704 executing one or more sequences of one or more instructions contained in main memory 706 . Such instructions may be read into main memory 706 from another computer-readable medium, such as storage device 710 . Execution of the sequences of instructions contained in main memory 706 causes processor 704 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
  • Non-volatile media includes, for example, optical or magnetic disks, such as storage device 710 .
  • Volatile media includes dynamic memory, such as main memory 706 .
  • Computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or memory cartridge, or any other medium from which a computer can read.
  • Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to processor 704 for execution.
  • the instructions may initially be carried on a magnetic disk of a remote computer.
  • the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
  • a modem local to computer system 700 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
  • An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 702 .
  • Bus 702 carries the data to main memory 706 , from which processor 704 retrieves and executes the instructions.
  • the instructions received by main memory 706 may optionally be stored on storage device 710 either before or after execution by processor 704 .
  • Computer system 700 also includes a communication interface 718 coupled to bus 702 .
  • Communication interface 718 provides a two-way data communication coupling to a network link 720 that is connected to a local network 722 .
  • communication interface 718 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line.
  • ISDN integrated services digital network
  • communication interface 718 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links may also be implemented.
  • communication interface 718 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
  • Network link 720 typically provides data communication through one or more networks to other data devices.
  • network link 720 may provide a connection through local network 722 to a host computer 724 or to data equipment operated by an Internet Service Provider (ISP) 726 .
  • ISP 726 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 728 .
  • Internet 728 uses electrical, electromagnetic or optical signals that carry digital data streams.
  • Computer system 700 can send messages and receive data, including program code, through the network(s), network link 720 and communication interface 718 .
  • a server 730 might transmit a requested code for an application program through Internet 728 , ISP 726 , local network 722 and communication interface 718 .
  • the received code may be executed by processor 704 as it is received, and/or stored in storage device 710 , or other non-volatile storage for later execution.

Abstract

A printing device includes a user interface, a print module and a locked print module. The locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If locked printing is specified for any of the electronic documents contained in the plurality of print data, then the corresponding print data is stored on the printing device and not processed for printing. The locked print module is further configured to verify password data with respect to user identification data. If the password data is not successfully verified with respect to the user identification data, then the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.

Description

RELATED APPLICATION DATA
This application is related to U.S. patent application Ser. No. 12/059,836 entitled APPROACH FOR PRINTING POLICY-ENABLED ELECTRONIC DOCUMENTS USING LOCKED PRINTING, filed Mar. 31, 2008; U.S. patent application Ser. No. 12/059,916 entitled APPROACH FOR PROCESSING PRINT DATA USING PASSWORD CONTROL DATA, filed Mar. 31, 2008; U.S. patent application Ser. No. 12/059,986 entitled APPROACH FOR PRINTING POLICY-ENABLED ELECTRONIC DOCUMENTS USING LOCKED PRINTING AND A SHARED MEMORY DATA STRUCTURE, filed Mar. 31, 2008, the contents all of which are incorporated by reference in their entirety for all purposes as if fully set forth herein.
FIELD OF THE INVENTION
This invention relates generally to printing of electronic documents.
BACKGROUND
The approaches described in this section are approaches that could be pursued, but not necessarily approaches that have been previously conceived or pursued. Therefore, unless otherwise indicated, the approaches described in this section may not be prior art to the claims in this application and are not admitted to be prior art by inclusion in this section.
The proliferation of communications networks, and in particular the Internet, has raised growing concerns about the security of information transmitted over networks. Numerous protection schemes have been implemented to secure electronic documents transmitted over the Internet, ranging from simple passwords to strong encryption. Some printing devices are configured with a feature known as “locked printing” to provide control over the printing of electronic documents. When a printing device is configured with a locked printing feature and print data is sent to the printing device, a printed version of an electronic document reflected in the print data is not generated until a user is verified at the printing device. Typically a user enters authentication data, such as a password, through an operation panel on the printing device. The printing device verifies the authentication data and if the authentication data is successfully verified, allows a printed version of the electronic document reflected in the print data to be generated, i.e., printed.
One of the problems with conventional locked printing approaches is that the documents stored on a printing device are susceptible to unauthorized access by third parties. Locke print documents are conventionally stored on a printing device until an authorized user prints the locked print electronic documents. During that time, an unauthorized third party may attempt to enter valid authentication data and gain access to the locked print data stored on the printing device. This is particularly problematic in situations where the locked print data contains sensitive information.
Based on the foregoing, there is a need for an approach for securely printing electronic documents that does not suffer from limitations of prior approaches.
SUMMARY
An approach is provided for implementing locked printing on a printing device that includes intruder detection and management. A printing device includes a user interface, a print module and a locked print module. The user interface is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device. The locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If locked printing is specified for any of the electronic documents contained in the plurality of print data, then the corresponding print data is stored on the printing device and not processed for printing. The locked print module is further configured to verify password data with respect to user identification data received via the user interface. If the password data is successfully verified with respect to the user identification data, then a user is allowed access to print data associated with the user identification data. If the password data is not successfully verified with respect to the user identification data, then the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device. The locked print module is also configured to verify multiple passwords for particular user identification data and if at least a specified number of the passwords are not able to be verified, then the locked print module causes the print data to be deleted from the printing device. This allows for accidental entering of incorrect password data without causing the deletion of print data. The print data selected for deletion may be associated with only the user identification data, or the print data may be associated with both the user identification data and other user identification data from a plurality of user identification data. In addition to causing the deletion of print data stored on the printing device, the locked print module may also cause the user identification data to be deleted from the printing device. The locked print module may also cause one or more notifications to be generated and transmitted that indicate that the verification of the password data with respect to the user identification data was not successful.
According to one embodiment of the invention, a printing device comprises a user interface, a print module and a locked print module. The user interface is configured to display information to users and receive user input from the users. The print module is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device. The locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If, for any of the print data from the plurality of print data, locked printing is specified for the electronic document contained in the print data, then the locked print module causes the print data to be stored at the printing device instead of being processed for printing. For user identification data and password data received via the user interface, the locked print module verifies the password data with respect to the user identification data. If the password data is successfully verified with respect to the user identification data, then the locked print module allows user access to print data associated with the user identification data. If the password data is not successfully verified with respect to the user identification data, then the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
BRIEF DESCRIPTION OF THE DRAWINGS
In the figures of the accompanying drawings like reference numerals refer to similar elements.
FIG. 1 is a block diagram that depicts an arrangement for printing policy-enabled electronic documents using locked printing according to an embodiment of the invention.
FIG. 2 is a block diagram that depicts an example implementation of locked print module, according to one embodiment of the invention.
FIG. 3 is a flow diagram that depicts an approach for printing a policy-enabled electronic document using locked printing, according to one embodiment of the invention
FIGS. 4A-4C depict an example graphical user interface that may be displayed on a user interface of a printing device.
FIG. 5 is a block diagram that depicts a job table that may be included in or stored in association with locked print data.
FIG. 6 is a flow diagram that depicts an approach for processing locked print data with intruder detection and management, according to one embodiment of the invention.
FIG. 7 is a block diagram of a computer system on which embodiments of the invention may be implemented.
DETAILED DESCRIPTION
In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to avoid unnecessarily obscuring the present invention. Various aspects of the invention are described hereinafter in the following sections:
    • I. OVERVIEW
    • II. ARCHITECTURE FOR LOCKED PRINTING WITH INTRUDER DETECTION AND MANAGEMENT
    • III. PROCESSING PRINT DATA USING LOCKED PRINTING
    • IV. INTRUDER DETECTION AND MANAGEMENT
    • V. NOTIFICATION OF INTRUDER DETECTIONS
    • VI. IMPLEMENTATION MECHANISMS
      I. Overview
An approach is provided for implementing locked printing on a printing device that includes intruder detection and management. A printing device includes a user interface, a print module and a locked print module. The user interface is configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device. The locked print module is configured to examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data. If locked printing is specified for any of the electronic documents contained in the plurality of print data, then the corresponding print data is stored on the printing device and not processed for printing. The locked print module is further configured to verify password data with respect to user identification data received via the user interface. If the password data is successfully verified with respect to the user identification data, then a user is allowed access to print data associated with the user identification data. If the password data is not successfully verified with respect to the user identification data, then the locked print module causes print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device. The locked print module is also configured to verify multiple passwords for particular user identification data and if at least a specified number of the passwords are not able to be verified, then the locked print module causes the print data to be deleted from the printing device. This allows for accidental entering of incorrect password data without causing the deletion of print data. The print data selected for deletion may be associated with only the user identification data, or the print data may be associated with both the user identification data and other user identification data from a plurality of user identification data. In addition to causing the deletion of print data stored on the printing device, the locked print module may also cause the user identification data to be deleted from the printing device. The locked print module may also cause one or more notifications to be generated and transmitted that indicate that the verification of the password data with respect to the user identification data was not successful.
This approach provides additional protection of locked print data, which is particularly useful in situations where locked print data contains sensitive or confidential information.
II. Architecture for Locked Printing with Intruder Detection and Management
FIG. 1 is a block diagram that depicts an arrangement 100 for implementing locked printing on a printing device that includes intruder detection and management, according to an embodiment of the invention. Arrangement 100 includes client devices 102, 104 and a printing device 106 communicatively coupled via a network 108.
Client devices 102, 104 may be implemented by any type of client device. Example implementations of client devices 102, 104 include, without limitation, workstations, personal computers, laptop computers, personal digital assistants (PDAs), cellular telephony devices and any type of mobile devices. In the example arrangement 100 depicted in FIG. 1, client device 102 is configured with an application 110 and a print driver 112. Application 110 may be any type of application process. Examples of application 110 include, without limitation, a word processor, a spreadsheet program and an email client. Print driver 112 is configured to provide a user interface for a user to specify that locked printing is to be used to print particular print data. Print driver 112 is also configured to process data from application 110 and generate print data that is provided to printing device 106 for processing. Thus, application 110 and print driver 112 operate together to generate and provide print data to printing device 106. In the example arrangement 100 depicted in FIG. 1, client device 104 is a generic client device. Client devices 102, 104 may be configured with other mechanisms, processes and functionality, depending upon a particular implementation.
Printing device 106 may be implemented by any type of device that is capable of processing print data and generating printed versions of electronic documents reflected in the print data. In example arrangement 100, printing device 106 includes a user interface 114, a print module 116, a locked print module 118 and storage 120. Printing device 106 may be configured with other mechanisms, processes and functionality, depending upon a particular implementation, and the approach described herein for implementing locked printing on a printing device is not limited to any particular type of printing device 106. For example, printing device 106 may be a multi-function peripheral (MFP) that includes any combination of printing, copying, facsimile and scanning capability, etc.
User interface 114 may be any mechanism and/or medium that provides for the exchange of information between a user and printing device 106. Examples of user interface 114 include, without limitation, a control panel with a display and keypad or keyboard, a cathode ray tube (CRT), a liquid crystal display (LCD), a keyboard, touchpad, mouse, trackball, a microphone and speakers, and any combination thereof. Printing device 106 may be configured to display information on user interface 114 in any number of languages, depending upon a particular implementation. As with conventional printing devices, the user interface 114 on printing device 106 may provide limited capability to easily enter alphanumeric strings.
Print module 116 may be implemented by one or more processes for processing print data received from client device 104 and for generating a printed version of an electronic document reflected in the print data. Print module 116 and locked print module 118 may be implemented as resident processes on printing device 106. Alternatively, print module 116 and locked print module 118 may be made available to printing device 106 on a removable media or may be implemented at a remote location with respect to printing device 106. Locked print module may be implemented by one or more processes for providing locked print services on printing device 106.
Storage 120 may be implemented by any type of storage, including volatile storage, non-volatile storage, or any combination of volatile and non-volatile storage. Examples of storage 120 include, without limitation, random access memory (RAM) and one or more disks.
Network 108 may be implemented by any type of medium and/or mechanism (wired or wireless) that facilitates the exchange of information between client device 104, printing device 106 and client device 104. Furthermore, network 108 may use any type of communications protocol and may be secured or unsecured, depending upon the requirements of a particular application.
The components and processes depicted in FIG. 1 and described herein may be implemented in hardware, software, or any combination of hardware or software, depending upon a particular implementation.
FIG. 2 is a block diagram that depicts an example implementation of a printing device 200, according to another embodiment of the invention. In this example, printing device 200 includes a network control system (NCS) 202 that performs initial processing of print data received by printing device 200. The NCS 202 includes a print module 204. Printing device 200 includes a user interface module 206 that may include, for example, an operation panel and supporting hardware and software. The user interface module 206 is configured to display information to users and receive user input from users, for example, via a keypad, function buttons, touchpad, etc. User interface module 206 includes controls that allow a user to enter authentication data. For example, a user may select a user ID assigned to them and then enter a password associated with their user ID. User interface module 206 also includes controls for allowing a user to select locked print data for printing. As described in more detail hereinafter, once a user has been authenticated, the user is given access to locked print data associated with that user. For example, a list of print jobs or electronic documents associated with the user (via the user ID) may be displayed on a user interface and the user is allowed to select one or more of the print jobs or electronic documents for printing.
Printing device 202 includes a print system 208 that is configured with language parsers, rasterization and engine control modules. A job filter/encryption module 210 encrypts and/or decrypts print data and is also configured to examine print data to determine whether locked printing is specified for electronic documents contained in the print data. If locked printing is not specified for an electronic document contained in print data, then the print data is processed by print module 204 and the electronic document is printed. If locked printing is specified for an electronic document contained in print data, then the print data is stored to storage 212 instead of being immediately processed by print module 204. As depicted in FIG. 2, storage 212 includes locked print data 214 and authentication data 216. The locked print data 214 is print data that has been designated as locked print data and is therefore stored on storage 212 instead of being immediately printed. The authentication data 216 is data used to authenticate users for providing access to locked print data 214. The authorization data 216 may include, for example, user ID/password pairs. The authorization data 216 may also indicate locked print data 214 associated with each user ID. A Web configuration module 218 allows a user, such as an administrator, to configure locked print functionality on printing device 200.
III. Processing Print Data Using Locked Printing
FIG. 3 is a flow diagram 300 that depicts an approach for printing an electronic document using locked printing. In step 302, a user initiates locked printing of an electronic document. For example, a user of client device 102 initiates printing of an electronic document via application 110 and designates locked printing for the electronic document, e.g., via a checkbox or other options in a printing dialog box.
In step 304, print data is generated by print driver 112 and the print data indicates that the electronic document reflected in the print data is a locked print electronic document. For example, the print data, or a header associated with the print data, may include one or more Print Job Language (PJL) or Page Descriptor Language (PDL) commands that specify that the electronic document is a locked print electronic document.
In step 306, the client device 102 transmits the print data to the printing device 106 over network 108. To cause the print data to be processed by locked print module 118, the print data may be transmitted to a particular port. For example, the printing data may be transmitted to a particular Transport Control Protocol (TCP) port, such as port 9100 or 515 as two possible examples, to cause locked print module 118 to receive and process the print data. Alternatively, the print data may simply be sent to the printing device 106 and an operating system routine or other routine forwards the print data to locked print module 118 for processing.
In step 308, at the printing device, a determination is made whether the electronic document in the print data is a locked print electronic document. This may be determined, for example, by the presence of one or more commands or codes in the print data that indicate that the electronic document is a locked print electronic document. The data indicating that an electronic document is a locked print electronic document may be contained in a header portion of the print data, in the body portion of the print data, or any combination of a header portion and body portion of the print data. For example, in some implementations, the application program that generates the print data in conjunction with a print driver may create a header that is appended to the print data and the header contains one or more commands that indicate that the electronic document contained in the print data is a locked print electronic document. In FIG. 1, the locked print module 118 examines the print data to determine whether the electronic document in the print data is a locked print electronic document. In FIG. 2, the NCS 202 passes the print data to the print system 208, which interprets the print commands contained in the print data. The print system 208 passes the print data to the job filter/encryption module 210 that examines the print data to determine whether the electronic document reflected in the print data is a locked print electronic document.
In step 310, if the electronic document reflected in the print data is a locked print electronic document, then the print data is stored on the printing device and not immediately processed for printing. For example, in FIG. 1, the locked print data 122 is stored on storage 120. In FIG. 2, the locked print data 214 is stored on storage 212.
In step 312, a user requests access to locked print jobs stored on the printing device and is authenticated. For example, a user may select a locked print jobs button or icon on user interface 114 to request access to locked print jobs stored on printing device 106. Then the user is queried for user credential data, such as a user ID and password. For example, FIG. 4A depicts an example graphical user interface that may be displayed on user interface 114. This graphical user interface allows a user to select from a list of specified user names. FIG. 4B depicts an example graphical user interface screen for querying the user for a password for the selected user ID. The user credential data entered by the user, in this example a user ID and password, is then authenticated. For example, locked print module 118 may be configured to authenticate the user credential data based upon data stored locally on storage 120. This may include, for example, comparing a user ID and password pair specified in the user credential data to a list of verified user ID/password pairs. As another example, a one-way hash function may be used to generate a result based upon the user ID/password pair specified in the authentication data. The result may then be compared to a list of verified results. These are just two examples of how authentication of the user credential data may be performed and the invention is not limited to any particular authentication mechanism or approach. Instead of authenticating the user credential data locally on printing device 106, the user credential data may be authenticated remotely with respect to printing device 106. For example, locked print module 118 may cause the user credential data to be transmitted to another location, e.g., an authentication server over network 108, for authentication. Locked print module 118 receives a return indication from the other location indicating whether the authentication data was verified. In FIG. 2, user interface module 206 may be configured to verify the user credential data entered by a user via user interface module 206 using the authentication data 216 stored on storage 212.
If the user is successfully authenticated, then in step 314, the user is given access to the locked print data. For example, a list of locked print jobs associated with the user may be displayed on the user interface 114. The determination of the locked print data that is associated with particular locked print data may be made using a variety of techniques. FIG. 5 is a block diagram that depicts a job table 500 that may be included in or stored in association with locked print data 214. In this example, the job table 500 includes N number of rows of data, where each row corresponds to a print data, i.e., a print job, stored on printing device 106, or 200. The print job data contained in job table 500 includes, for each print job, a JOB ID, which is data that identifies the print job and user authentication data, in the form of a USER ID and PASSWORD. The USER ID and PASSWORD are used to authenticate a user at printing device 106 or 200. Although in FIG. 5 each print job has one associated user, it is possible for multiple users to be associated with a print job so that they can each print the print job. The print job data also includes a TIMESTAMP, which is data that indicates a time at which the print data was generated, and a JOB NAME. The print job data also includes a PAGE COUNT, which indicates the number of pages in the print data, and a PRINT COUNT, which indicates a number of times that the print data has been printed. The print job table 500 may include fewer columns of data or additional columns of data for each print job, depending upon a particular implementation, and the approach is not limited to any particular print job data. Furthermore, the print job data contained in job table 500 may be arranged and formatted in a wide variety of ways and is not limited to the example table arrangement depicted in FIG. 5.
Print data may be arranged on the user interface 114, for example, sorted by name or in an order in which the print data was received by printing device 106. The graphical user interface may also include one or more user interface objects that allow a user to select one or more print data to be processed at printing device 106 and one or more actions to be performed on those print data. For example, a user may select a user interface object associated with particular print data and then select a user interface object associated with a printing or deleting function to cause the particular print data to be processed accordingly. Users may be given different types of access to locked print data, depending upon a particular implementation. For example, users may be given access to only the print data that they generated. As another example, users may be given access to all locked print data associated with a logical group, such as a department, project, team, etc. As yet another example, an administrative user may be given access to all locked print data on a printing device so that the administrative user can properly manage the printing device. Access may be based upon the user credential data or other data stored on printing device 106. FIG. 4C depicts an example user interface screen that displays locked print jobs and provides controls for printing and deleting the locked print jobs.
In step 316, the user selects a locked print electronic document to be processed and one or more actions to be performed on the print data. In the present example, the user selects a locked print electronic document for printing and in step 318, the selected electronic document is printed.
IV. Intruder Detection and Management
FIG. 6 is a flow diagram 600 that depicts an approach for processing locked print data with intruder detection and management, according to one embodiment of the invention. In step 602, a user selects or enters a user ID. For example, a list of users may be displayed on user interface 114 and the user selects a particular user from the list using a touchpad or other user interface controls. Alternatively, the user may enter a user ID via user interface 114, for example via a keyboard or keypad. In step 604, a fail count is reset for the user ID selected or entered by the user. The fail count may be a value stored in a variable and maintained by locked print module 118. In step 606, the printing device 106 receives a password from the user. For example, a user may enter the password via a keyboard, keypad or other user interface controls.
In step 608, a determination is made whether the entered password is correct for the user ID that was selected or entered by the user. This determination may be made, for example, by comparing the user ID and password entered by the user to user ID and password data stored on the printing device 106. The user ID and password data may be stored in job table 500 as previously described, with other data, or separately, depending upon a particular implementation. If, in step 608, the entered password matches the password stored on the printing device 106 for the user ID, then the user is considered to be successfully authorized and in step 610, a list of print data that corresponds to the user ID is displayed on user interface 114. The print data that corresponds to the user ID may be determined, for example, by examining job table 500. Suppose that a user selects or enters USER1 and is properly authorized by entering the correct password that corresponds to the user ID USER 1. In step 608, the locked print module 118 examines job table 500 to identify print data that has a corresponding user ID of USER1. In the present example, user ID USER 1 is associated with job 01, so this print data is displayed on user interface 114.
In step 612, a user selection of print data is received. The user selection indicates one or more print data that the user selects for printing. The user may select one or more print data via user interface 114. In step 614, the selected print data is printed.
If, in step 608, a determination is made that the password is not correct for the user ID, then in step 616, a fail count for the user ID is incremented. In step 618, a determination is made whether the current fail count is equal to a maximum fail count. If not, then control returns to step 606 and another password may be entered. This password is then verified in step 608 and if the password is correct for the user ID, then steps 610-614 are performed. If the password is not correct for the user ID, then in step 616, the fail count is again incremented and in step 618, checked against the maximum fail count. If in step 618 a determination is made that the fail count is equal to the maximum fail count, then it is likely that someone is attempting to determine the correct password for a particular user ID, e.g., by entering in several best guesses at the password. In step 620, the user ID, password and corresponding print data are deleted from the printing device 106 so that the unauthorized third party cannot gain access to the locked print data. The determination of the print data that corresponds to the user ID may be made, for example, by examining job table 500 to identify print data associated with the user ID. The print data that includes the user ID for which the fail count was satisfied is deleted from the printing device 106.
Embodiments of the invention have been described herein and depicted in the figures in the context of a one-to-one relationship between user IDs and print data. That is, that each locked print document stored on a printing device has one associated user ID that is used to determine access to the locked print documents. In some situations, print data may be associated with multiple user IDs. For example, suppose that a user A creates an electronic document that contains sensitive information and decides to use locked printing to provide better control over the printing of the electronic document. Suppose further that the application program that user A uses to create the electronic document allows multiple locked print recipients to be specified. For example, user A might indicate that user B and user C are also authorized to access the electronic document. At the printing device, any of user A, user B or user C may enter their user ID and password at the printing device to obtain access to and print the electronic document. Using the approach described herein, when the printing device detects that an incorrect password has been entered for the user ID of user A at least a specified number of times, then the print data associated with the user ID of user A is deleted from the printing device, along with the user ID and password data for user A. According to one embodiment of the invention, when some or all print data on a printing device may be associated with multiple user IDs, and the printing device detects that the fail count for the particular user ID equals the maximum fail count value, indicating detection of an intruder, then print data that is associated with only the particular user ID is deleted from the printing device. The particular user ID and corresponding password are also deleted. In this situation, print data that was associated with only the particular user ID is no longer accessible. Print data that is associated with the particular user ID and other user IDs is not deleted from the printing device and is accessible by the users associated with the other user IDS. The particular user ID cannot be used because it (and the corresponding password) have been deleted from the printing device. As an alternative to the foregoing, for additional security, all print data associated with the particular user ID may be deleted from the printing device, irrespective of whether the print data is also associated with other user IDs.
The maximum fail count used to trigger the deletion of the user ID and corresponding print data from the printing device 106 may be set to different values depending upon a particular implementation. For example, the maximum fail count may be set to a value that allows for normal data entry errors, but provides protection against repeated attempts to enter a password for a user ID, which may be indicative of an unauthorized third party attempting to gain access. One example maximum fail count value is three. Thus, if three incorrect passwords are consecutively entered for a particular user ID, then both the particular user ID and all print data associated with the particular user ID is deleted from printing device 106. A global maximum fail count value may be used for all user IDs, or individual maximum fail count values may be used for each user ID, depending upon a particular implementation. The fail count values may be specified by administrative personnel, for example via web configuration module 218, and stored on storage 212. In step 622, optional reporting may be performed, as described in more detail hereinafter.
V. Notification of Intruder Detections
As previously described herein, once a determination is made that for a particular user ID, the current fail count equals the maximum fail count, then the print data that corresponds to the particular user ID is deleted from the printing device. The particular user ID and corresponding password data may also be deleted from the printing device. According to one embodiment of the invention, a printing device is further configured to provide notification of intruder detections. The notification may take many forms. For example, a notification may be provided via the user interface 114 of printing device 106. As another example, a notification may be provided via email. The notification may include information about the intruder detection. For example, the notification may indicate the user ID and the number of failed attempts, which is typically the maximum fail count value.
VI. Implementation Mechanisms
The approach described herein for printing locked print electronic documents may be implemented on any type of computing platform or architecture. For purposes of explanation, FIG. 7 is a block diagram that depicts an example computer system 700 upon which embodiments of the invention may be implemented. Computer system 700 includes a bus 702 or other communication mechanism for communicating information, and a processor 704 coupled with bus 702 for processing information. Computer system 700 also includes a main memory 706, such as a random access memory (RAM) or other dynamic storage device, coupled to bus 702 for storing information and instructions to be executed by processor 704. Main memory 706 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 704. Computer system 700 further includes a read only memory (ROM) 708 or other static storage device coupled to bus 702 for storing static information and instructions for processor 704. A storage device 710, such as a magnetic disk or optical disk, is provided and coupled to bus 702 for storing information and instructions.
Computer system 700 may be coupled via bus 702 to a display 712, such as a cathode ray tube (CRT), for displaying information to a computer user. An input device 714, including alphanumeric and other keys, is coupled to bus 702 for communicating information and command selections to processor 704. Another type of user input device is cursor control 716, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 704 and for controlling cursor movement on display 712. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
The invention is related to the use of computer system 700 for implementing the techniques described herein. According to one embodiment of the invention, those techniques are performed by computer system 700 in response to processor 704 executing one or more sequences of one or more instructions contained in main memory 706. Such instructions may be read into main memory 706 from another computer-readable medium, such as storage device 710. Execution of the sequences of instructions contained in main memory 706 causes processor 704 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions to implement the invention. Thus, embodiments of the invention are not limited to any specific combination of hardware circuitry and software.
The term “computer-readable medium” as used herein refers to any medium that participates in providing data that causes a computer to operation in a specific manner. In an embodiment implemented using computer system 700, various computer-readable media are involved, for example, in providing instructions to processor 704 for execution. Such a medium may take many forms, including but not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, optical or magnetic disks, such as storage device 710. Volatile media includes dynamic memory, such as main memory 706. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, or any other magnetic medium, a CD-ROM, any other optical medium, a RAM, a PROM, and EPROM, a FLASH-EPROM, any other memory chip or memory cartridge, or any other medium from which a computer can read.
Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to processor 704 for execution. For example, the instructions may initially be carried on a magnetic disk of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local to computer system 700 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 702. Bus 702 carries the data to main memory 706, from which processor 704 retrieves and executes the instructions. The instructions received by main memory 706 may optionally be stored on storage device 710 either before or after execution by processor 704.
Computer system 700 also includes a communication interface 718 coupled to bus 702. Communication interface 718 provides a two-way data communication coupling to a network link 720 that is connected to a local network 722. For example, communication interface 718 may be an integrated services digital network (ISDN) card or a modem to provide a data communication connection to a corresponding type of telephone line. As another example, communication interface 718 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation, communication interface 718 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
Network link 720 typically provides data communication through one or more networks to other data devices. For example, network link 720 may provide a connection through local network 722 to a host computer 724 or to data equipment operated by an Internet Service Provider (ISP) 726. ISP 726 in turn provides data communication services through the world wide packet data communication network now commonly referred to as the “Internet” 728. Local network 722 and Internet 728 both use electrical, electromagnetic or optical signals that carry digital data streams.
Computer system 700 can send messages and receive data, including program code, through the network(s), network link 720 and communication interface 718. In the Internet example, a server 730 might transmit a requested code for an application program through Internet 728, ISP 726, local network 722 and communication interface 718. The received code may be executed by processor 704 as it is received, and/or stored in storage device 710, or other non-volatile storage for later execution.
In the foregoing specification, embodiments of the invention have been described with reference to numerous specific details that may vary from implementation to implementation. Thus, the sole and exclusive indicator of what is, and is intended by the applicants to be, the invention is the set of claims that issue from this application, in the specific form in which such claims issue, including any subsequent correction. Hence, no limitation, element, property, feature, advantage or attribute that is not expressly recited in a claim should limit the scope of such claim in any way. The specification and drawings are, accordingly, to be regarded in an illustrative rather than a restrictive sense.

Claims (20)

What is claimed is:
1. A printing device comprising:
a user interface configured to display information to users and receive user input from the users;
a print module configured to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device; and
a locked print module configured to:
examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data,
if, for any of the print data from the plurality of print data, locked printing is specified for the electronic document contained in the print data, then cause the print data, from the plurality of print data, for which locked printing is specified for the electronic document contained in the print data, to be stored at the printing device as locked print data instead of being processed for printing,
for user identification data and password data received via the user interface, verify the password data with respect to the user identification data,
in response to the password data being successfully verified with respect to the user identification data, allowing user access to print data associated with the user identification data,
in response to the password data not being successfully verified with respect to the user identification data, causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
2. The printing device as recited in claim 1, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with only the user identification data from a plurality of user identification data to be deleted from the printing device.
3. The printing device as recited in claim 1, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with the user identification data and other user identification data from a plurality of user identification data to be deleted from the printing device.
4. The printing device as recited in claim 1, wherein the locked print module is further configured to cause the user identification data to be deleted from the printing device.
5. The printing device as recited in claim 1, wherein:
the password data includes two or more passwords, and
the locked print module is further configured to:
verify each of the two or more passwords with respect to the user identification data, and
cause the locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device if at least a specified number of the two or more passwords are not successfully verified with respect to the user identification data.
6. The printing device as recited in claim 1, wherein the locked print module is further configured to cause a notification to be generated indicating that the password data was not successfully verified with respect to the user identification data.
7. The printing device as recited in claim 1, wherein the locked print module is further configured to cause a notification to be displayed on the user interface of the printing device, wherein the notification indicates that the password data was not successfully verified with respect to the user identification data.
8. The printing device as recited in claim 1, wherein the locked print module is further configured to cause an email notification to be generated and transmitted, wherein the email notification indicates that the password data was not successfully verified with respect to the user identification data.
9. A computer-implemented method for processing print data at a
printing device, the computer-implemented method comprising:
a user interface at the printing device displaying information to users and receiving user input from the users;
a print module at the printing device processing print data and causing a printed version of an electronic document contained in the print data to be generated by the printing device; and
a locked print module at the printing device:
examining a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data,
if, for any of the print data from the plurality of print data, locked printing is specified for the electronic document contained in the print data, then cause the print data, from the plurality of print data, for which locked printing is specified for the electronic document contained in the print data, to be stored at the printing device as locked print data instead of being processed for printing,
for user identification data and password data received via the user interface, verify the password data with respect to the user identification data,
in response to the password data being successfully verified with respect to the user identification data, allowing user access to print data associated with the user identification data,
in response to the password data not being successfully verified with respect to the user identification data, en-causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
10. The computer-implemented method as recited in claim 9, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with only the user identification data from a plurality of user identification data to be deleted from the printing device.
11. The computer-implemented method as recited in claim 9, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with the user identification data and other user identification data from a plurality of user identification data to be deleted from the printing device.
12. The computer-implemented method as recited in claim 9, further comprising the locked print module at the printing device causing the user identification data to be deleted from the printing device.
13. The computer-implemented method as recited in claim 9, wherein:
the password data includes two or more passwords, and
the computer-implemented method further comprises the locked print module at the printing device:
verifying each of the two or more passwords with respect to the user identification data, and
causing the locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device if at least a specified number of the two or more passwords are not successfully verified with respect to the user identification data.
14. The computer-implemented method as recited in claim 9, further comprising the locked print module at the printing device causing a notification to be generated indicating that the password data was not successfully verified with respect to the user identification data.
15. The computer-implemented method as recited in claim 9, further comprising the locked print module at the printing device causing a notification to be displayed on the user interface of the printing device, wherein the notification indicates that the password data was not successfully verified with respect to the user identification data.
16. The computer-implemented method as recited in claim 9, further comprising the locked print module at the printing device causing an email notification to be generated and transmitted, wherein the email notification indicates that the password data was not successfully verified with respect to the user identification data.
17. A non-transitory computer-readable medium for processing print data at a printing device, the non-transitory computer-readable medium storing instructions which, when processed by one or more processors, cause:
a user interface to display information to users and receive user input from the users;
a print module to process print data and cause a printed version of an electronic document contained in the print data to be generated by the printing device; and
a locked print module to:
examine a plurality of print data received by the printing device to determine whether locked printing is specified for any electronic documents contained in the plurality of print data,
if, for any of the print data from the plurality of print data, locked printing is specified for the electronic document contained in the print data, then cause the print data, from the plurality of print data, for which locked printing is specified for the electronic document contained in the print data, to be stored at the printing device as locked print data instead of being processed for printing,
for user identification data and password data received via the user interface, verify the password data with respect to the user identification data,
in response to the password data being successfully verified with respect to the user identification data, allowing user access to print data associated with the user identification data,
in response to the password data not being successfully verified with respect to the user identification data, causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device.
18. The non-transitory computer-readable medium as recited in claim 17, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with only the user identification data from a plurality of user identification data to be deleted from the printing device.
19. The non-transitory computer-readable medium as recited in claim 17, wherein causing locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device includes causing locked print data that is both stored on the printing device and associated with the user identification data and other user identification data from a plurality of user identification data to be deleted from the printing device.
20. The non-transitory computer-readable medium as recited in claim 17, wherein:
the password data includes two or more passwords, and
the computer-readable medium carries one or more additional instructions which, when processed by the one or more processors, causes the locked print module to:
verify each of the two or more passwords with respect to the user identification data, and
cause the locked print data that is both stored on the printing device and associated with the user identification data to be deleted from the printing device if at least a specified number of the two or more passwords are not successfully verified with respect to the user identification data.
US12/166,999 2008-07-02 2008-07-02 Locked print with intruder detection and management Active 2034-11-29 US9411956B2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
US12/166,999 US9411956B2 (en) 2008-07-02 2008-07-02 Locked print with intruder detection and management
EP09164263A EP2141631A3 (en) 2008-07-02 2009-07-01 Locked print with intruder detection and management
JP2009156816A JP2010012785A (en) 2008-07-02 2009-07-01 Printing apparatus, printing method, and computer-readable recording medium
US15/202,853 US9894246B2 (en) 2008-07-02 2016-07-06 Locked print with intruder detection and management
US15/387,330 US9729758B2 (en) 2008-07-02 2016-12-21 Locked print with intruder detection and management

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/166,999 US9411956B2 (en) 2008-07-02 2008-07-02 Locked print with intruder detection and management

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/202,853 Continuation US9894246B2 (en) 2008-07-02 2016-07-06 Locked print with intruder detection and management

Publications (2)

Publication Number Publication Date
US20100002249A1 US20100002249A1 (en) 2010-01-07
US9411956B2 true US9411956B2 (en) 2016-08-09

Family

ID=41129132

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/166,999 Active 2034-11-29 US9411956B2 (en) 2008-07-02 2008-07-02 Locked print with intruder detection and management
US15/202,853 Active US9894246B2 (en) 2008-07-02 2016-07-06 Locked print with intruder detection and management
US15/387,330 Active US9729758B2 (en) 2008-07-02 2016-12-21 Locked print with intruder detection and management

Family Applications After (2)

Application Number Title Priority Date Filing Date
US15/202,853 Active US9894246B2 (en) 2008-07-02 2016-07-06 Locked print with intruder detection and management
US15/387,330 Active US9729758B2 (en) 2008-07-02 2016-12-21 Locked print with intruder detection and management

Country Status (3)

Country Link
US (3) US9411956B2 (en)
EP (1) EP2141631A3 (en)
JP (1) JP2010012785A (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7808664B2 (en) * 2005-06-08 2010-10-05 Ricoh Company, Ltd. Approach for securely printing electronic documents
US8031348B2 (en) * 2005-06-08 2011-10-04 Ricoh Company, Ltd. Approach for securely printing electronic documents
US8031349B2 (en) * 2005-06-08 2011-10-04 Ricoh Company, Ltd. Approach for securely printing electronic documents
US8264715B2 (en) * 2006-04-25 2012-09-11 Ricoh Company, Ltd. Approach for implementing locked printing with remote unlock on printing devices
US7812984B2 (en) 2006-05-23 2010-10-12 Ricoh Company, Ltd. Remote stored print job retrieval
US20080174810A1 (en) * 2007-01-22 2008-07-24 Ricoh Company, Ltd. Fault tolerant printing system
US8115951B2 (en) * 2007-04-20 2012-02-14 Ricoh Company, Ltd. Approach for implementing locked printing with unlock via a user input device
US8319992B2 (en) * 2007-07-20 2012-11-27 Ricoh Company, Ltd. Approach for processing locked print jobs obtained from other printing devices
US8797563B2 (en) * 2008-03-31 2014-08-05 Ricoh Company, Ltd. Approach for printing policy-enabled electronic documents using locked printing
US9513857B2 (en) * 2008-03-31 2016-12-06 Ricoh Company, Ltd. Approach for processing print data using password control data
US9311031B2 (en) * 2008-03-31 2016-04-12 Ricoh Company, Ltd. Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
US8228538B2 (en) * 2008-06-23 2012-07-24 Ricoh Company, Ltd. Performance of a locked print architecture
US9411956B2 (en) * 2008-07-02 2016-08-09 Ricoh Company, Ltd. Locked print with intruder detection and management
JP4655120B2 (en) * 2008-07-29 2011-03-23 コニカミノルタビジネステクノロジーズ株式会社 Authentication system and authentication device
US20100253968A1 (en) * 2009-04-03 2010-10-07 Jayasimha Nuggehalli Approach for displaying cost data for locked print data at printing devices
US8456662B2 (en) * 2009-04-15 2013-06-04 Ricoh Company, Ltd. Control for display of multiple versions of a printable document for locked print
JP5935368B2 (en) 2011-09-16 2016-06-15 株式会社リコー Information processing apparatus, job processing system, job processing method, and job processing program
US9742751B2 (en) * 2012-11-05 2017-08-22 Paypal, Inc. Systems and methods for automatically identifying and removing weak stimuli used in stimulus-based authentication
US10007794B2 (en) 2013-12-16 2018-06-26 Ctpg Operating, Llc Methods and systems for ensuring printer looses ability to print security patterns if disconnected from approved system
US9536067B1 (en) * 2014-01-01 2017-01-03 Bryant Christopher Lee Password submission without additional user input
US9292236B2 (en) * 2014-02-28 2016-03-22 Ricoh Company, Ltd. Locked print in cloud printing environments
US10911437B2 (en) * 2015-11-05 2021-02-02 Cerner Innovation, Inc Detection of anomalous authentication attempts in a client-server architecture
JP6447584B2 (en) * 2016-06-28 2019-01-09 京セラドキュメントソリューションズ株式会社 Image reading apparatus and image forming apparatus
JP7058970B2 (en) * 2017-10-06 2022-04-25 キヤノン株式会社 Image forming device, control method, and program
JP7075786B2 (en) * 2018-03-09 2022-05-26 シャープ株式会社 Image forming device
US11023582B2 (en) * 2018-12-19 2021-06-01 EMC IP Holding Company LLC Identification and control of malicious users on a data storage system
US10942688B2 (en) * 2019-06-25 2021-03-09 Kyocera Document Solutions Inc. System and method for implementing policy-based printing operations

Citations (147)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0695464B2 (en) 1983-03-30 1994-11-24 イ−・アイ・デユポン・ド・ネモア−ス・アンド・コンパニ− Electric filter connector
EP0657845A2 (en) 1993-12-01 1995-06-14 Canon Kabushiki Kaisha Apparatus and method for printing confidential data
US5633932A (en) 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
JPH10207660A (en) 1997-01-24 1998-08-07 Ricoh Co Ltd Printing system
US5845066A (en) 1996-03-25 1998-12-01 Mitsubishi Denki Kabushiki Kaisha Security system apparatus for a memory card and memory card employed therefor
US5880447A (en) 1996-07-02 1999-03-09 Ibm Japan, Ltd. Data output controller and data output system using this output controller
JPH11191043A (en) 1997-12-26 1999-07-13 Canon Inc Print system and data processing method thereof, and storage medium stored with computer-readable program
US5970218A (en) 1997-02-11 1999-10-19 Toshiba America Information Systems, Inc. Private print
WO2000068817A1 (en) 1999-05-12 2000-11-16 Hewlett-Packard Company Generalized resource server
US6161139A (en) * 1998-07-10 2000-12-12 Encommerce, Inc. Administrative roles that govern access to administrative functions
JP2001067201A (en) 1999-08-31 2001-03-16 Canon Inc Picture processing system and picture processor, and method for controlling the system, and method for controlling the device
JP2001125982A (en) 1999-10-29 2001-05-11 Casio Comput Co Ltd Contents distribution system, server, output device and charging system
JP2001217948A (en) 2000-02-01 2001-08-10 Brother Ind Ltd Electronic device and image forming device
US20010029521A1 (en) 2000-03-29 2001-10-11 Hiroshi Matsuda Control method for image processing apparatus connectable to computer network
US20010038462A1 (en) 1998-03-19 2001-11-08 Teeuwen Peter Johannes Hendrikus Maria Interactive printing with a plurality of printer devices
US20020002503A1 (en) 2000-04-27 2002-01-03 Kenji Matsuoka Business method by internet connection information registration service, internet connection setting method, internet connection information registration method, and computer-readable recording medium which records application program
JP2002007095A (en) 2000-03-29 2002-01-11 Canon Inc Data processor and its control method
US20020023143A1 (en) 2000-04-11 2002-02-21 Stephenson Mark M. System and method for projecting content beyond firewalls
US20020021902A1 (en) 2000-07-24 2002-02-21 Yuichi Hosoda Image recording device, image input device, and data processor, image recording method, and storage medium recording image record control program
US20020041394A1 (en) 2000-10-05 2002-04-11 Satoshi Aoki Printing system using a portable terminal and method for imposing a printing charge
US20020054333A1 (en) 2000-07-31 2002-05-09 Kosuke Yamamoto Information processing apparatus, print time informing method, and computer-readable memory medium storing program therein
US20020059322A1 (en) 2000-10-19 2002-05-16 Takao Miyazaki Electronic image display device and printing system therefor
JP2002175241A (en) 2000-12-06 2002-06-21 Fuji Xerox Co Ltd Document providing device, printed document providing system and printing service method
US20020097431A1 (en) 2001-01-22 2002-07-25 Munemitsu Ikegami Printing system and method restricting functions of printers, usable by each user
US20020120855A1 (en) 2001-01-31 2002-08-29 Wiley Anthony J. Mechanism for controlling if/when material can be printed on a specific printer
JP2002312146A (en) 2001-04-10 2002-10-25 Fuji Xerox Co Ltd Client device and network printing system
US20030044009A1 (en) 2001-08-31 2003-03-06 Sridhar Dathathraya System and method for secure communications with network printers
US20030065404A1 (en) 2001-09-20 2003-04-03 Bhatti Kristen L. Apparatus and method for controlling stored jobs
US20030090696A1 (en) 2001-11-13 2003-05-15 Willis Keith L. Systems and methods for controlling an image forming system based on customer replaceable unit status
US20030090697A1 (en) 2001-11-09 2003-05-15 Hewlett-Packard Co. Printer that redirects jobs to buddy printer
US6614546B1 (en) 1997-03-10 2003-09-02 Minolta Co., Ltd. Image processing system and image forming apparatus
US20040019671A1 (en) 2002-07-29 2004-01-29 Metz James Michael Network management tool for maintaining printing device information
US20040056889A1 (en) 2002-09-23 2004-03-25 Seiichi Katano Multi-function peripheral
US20040088378A1 (en) 2002-11-04 2004-05-06 Moats Travis N. Method and system for viewing stored print jobs through an embedded web server interface
US6735665B1 (en) 1999-07-19 2004-05-11 Minolta Co., Ltd. Data processing device for specifying data storage information on a portable recording medium
US20040090652A1 (en) 2002-10-22 2004-05-13 Yoon Tae-Jung Printer, and control method thereof, having extended communication interface functions
US20040095595A1 (en) 2002-11-20 2004-05-20 Jacobsen Dana A. Device and method for securing print jobs stored on a printer
US20040118911A1 (en) 2002-12-14 2004-06-24 Ncr Corporation Self service terminal
US20040125402A1 (en) 2002-09-13 2004-07-01 Yoichi Kanai Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy
JP2004181647A (en) 2002-11-29 2004-07-02 Seiko Epson Corp Printer with alternative print function
US20040140611A1 (en) 2003-01-21 2004-07-22 Mui Paul K. Multifunction output tray for printer and paper handling device
JP2004221979A (en) 2003-01-15 2004-08-05 Kyocera Mita Corp Image forming device
US20040156068A1 (en) * 2003-02-10 2004-08-12 Sharp Kabushiki Kaisha Data processing apparatus
US20040159783A1 (en) 2003-01-27 2004-08-19 Ciphergen Biosystems, Inc. Data management system and method for processing signals from sample spots
US20040169884A1 (en) 1999-08-31 2004-09-02 Brother Kogyo Kabushiki Kaisha Printing system including a printer and client devices connected by a network
EP1465052A2 (en) 2003-04-01 2004-10-06 Seiko Epson Corporation Document sharing service for network printing
US20040196492A1 (en) 2003-04-01 2004-10-07 International Business Machines Corporation System and method for controlling a remote printer
JP2004287824A (en) 2003-03-20 2004-10-14 Ricoh Co Ltd Printer driver program and printer
US20040239992A1 (en) 2002-01-10 2004-12-02 Brother Kogyo Kabushiki Kaisha Information processing device, network printing system, and computer program
US20040246515A1 (en) 2003-06-03 2004-12-09 Sharp Laboratories Of America, Inc. System and method for delivering native structure document printing instructions
US20040257601A1 (en) 2003-05-29 2004-12-23 Canon Kabushiki Kaisha Image forming apparatus
US20040257613A1 (en) 2003-04-02 2004-12-23 Hiroki Okabe Print job management apparatus and print job management method
US20040263870A1 (en) 2003-06-20 2004-12-30 Masanori Itoh Method and apparatus for providing a service for sharing a printing environment
US20050030151A1 (en) 2003-08-07 2005-02-10 Abhishek Singh Secure authentication of a user to a system and secure operation thereafter
US20050039044A1 (en) 2002-06-17 2005-02-17 Kazuhito Gassho Printer server and print system and data receiving device and data sending/receiving system
US6862583B1 (en) 1999-10-04 2005-03-01 Canon Kabushiki Kaisha Authenticated secure printing
US20050046876A1 (en) 2003-08-29 2005-03-03 Burget Art H. Method and system for controlling access of clients and users to a print server
JP2005074772A (en) 2003-08-29 2005-03-24 Kyocera Mita Corp Printing device and method
US20050068547A1 (en) 2003-09-29 2005-03-31 Canon Kabushiki Kaisha Print processing apparatus, print processing method, system control method, program, and storage medium
JP2005092731A (en) 2003-09-19 2005-04-07 Fuji Xerox Co Ltd Online print management system and method, offline job restoring device, offline job generating device, and printer driver
US6880124B1 (en) 1999-06-04 2005-04-12 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving information, and methods of document retrieval
US20050094195A1 (en) 2003-11-04 2005-05-05 Matsushita Electric Industrial Co., Ltd. Multifunction apparatus and user authentication method
US20050100378A1 (en) 2003-11-12 2005-05-12 Canon Kabushiki Kaisha Print apparatus, print system, print method, job processing method, storage medium, and program
EP1367814A3 (en) 2002-05-27 2005-06-08 Océ-Technologies B.V. Processing of a digital mixed colour document
US20050141013A1 (en) 2003-12-03 2005-06-30 Canon Kabushiki Kaisha Redirect-on-error print system, information processing apparatus, control method, and control program
US20050149755A1 (en) 2003-10-23 2005-07-07 Toshihiro Shima Printer and print system
JP2005178070A (en) 2003-12-17 2005-07-07 Canon Inc Printing processing system
US20050152543A1 (en) 2003-11-04 2005-07-14 Toshihiro Shima Printer and print system
US20050154884A1 (en) 2003-11-27 2005-07-14 Oce-Technologies B.V. Secure data transmission in a network system of image processing devices
JP2005196741A (en) 2003-12-10 2005-07-21 Canon Inc Information processing device, method, and program
US20050168769A1 (en) 2004-01-31 2005-08-04 Samsung Electronics Co., Ltd. Security print system and method
US20050182508A1 (en) 2004-02-18 2005-08-18 Brother Kogyo Kabushiki Kaisha Image editing device and print/embroidery data creating device
US20050182822A1 (en) 2004-02-17 2005-08-18 Daniel Stuart W. Imaging device with memory device interface
US20050183141A1 (en) 2004-02-18 2005-08-18 Nozomi Sawada Image forming apparatus, information processing apparatus, information processing system, authentication method and computer-readable storage medium
JP2005225099A (en) 2004-02-13 2005-08-25 Oki Data Corp Printing device
US6938154B1 (en) 2000-06-19 2005-08-30 Xerox Corporation System, method and article of manufacture for a cryptographic key infrastructure for networked devices
US20050210253A1 (en) 2004-01-30 2005-09-22 Canon Kabushiki Kaisha Secure communication method, terminal device, authentication server, computer program, and computer-readable recording medium
US20050213136A1 (en) 2004-03-29 2005-09-29 Hideo Noyama Print management system
EP1511287A3 (en) 2003-08-27 2005-10-12 Matsushita Electric Industrial Co., Ltd Network scanner with incorporated multifunction machine
US20050229189A1 (en) 2001-10-22 2005-10-13 Mcmanus Eamonn Inter-process communication using different programming languages
US20050254086A1 (en) 2004-05-14 2005-11-17 Hiroki Shouno Job display control method
US6970259B1 (en) 2000-11-28 2005-11-29 Xerox Corporation Systems and methods for forgery detection and deterrence of printed documents
US20050268089A1 (en) 2004-05-25 2005-12-01 Samsung Electronics Co., Ltd. Printing system and method that support security function
US6973671B1 (en) 2000-02-24 2005-12-06 International Business Machines Corporation Secure access to a unified logon-enabled data store
US20050273852A1 (en) 2004-05-24 2005-12-08 Sharp Laboratories Of America, Inc. Imaging job authorization
US20050273843A1 (en) 2004-06-02 2005-12-08 Canon Kabushiki Kaisha Encrypted communication method and system
US20050276618A1 (en) 2004-06-09 2005-12-15 International Business Machines Corporation Method and system for managing print jobs for a printer to maximize throughput
US20060017954A1 (en) 2004-07-22 2006-01-26 Ly An V System and method for normalizing job properties
EP1621994A1 (en) 2004-07-29 2006-02-01 Océ-Technologies B.V. A method for printing a digital print file and a printer adapted for applying the said method
US20060028672A1 (en) 2004-08-04 2006-02-09 Canon Kabushiki Kaisha Process control system, process control server and process control method
US7002703B2 (en) 2001-01-18 2006-02-21 Hewlett-Packard Development Company, L.P. Automatic download to print job retention
US20060044589A1 (en) 2004-08-26 2006-03-02 Shuichi Nakagawaji Printing device and method for printing
US20060044607A1 (en) 2004-08-31 2006-03-02 Canon Kabushiki Kaisha Document providing system and document management server
US20060112270A1 (en) 2004-11-19 2006-05-25 Konica Minolta Systems Laboratory, Inc. Password encrypting apparatus and method for encrypting password
JP2006205374A (en) 2005-01-25 2006-08-10 Canon Inc Printing device and information processing device
JP2006227908A (en) 2005-02-17 2006-08-31 Seiko Epson Corp Print commanding device, print executing device, print command and print executing system, and method therefor, and program
JP2006231675A (en) 2005-02-24 2006-09-07 Canon Inc Printing processing apparatus
US7110541B1 (en) 2000-11-28 2006-09-19 Xerox Corporation Systems and methods for policy based printing
JP2006252142A (en) 2005-03-10 2006-09-21 Ricoh Co Ltd Information management device, information management method, program making computer execute this method, and recording medium
US20060268315A1 (en) 2005-05-20 2006-11-30 Xerox Corporation Systems and method for controlling hide and hold jobs in a network
US20060279768A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
US20060279761A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
US20060279760A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
JP2006341404A (en) 2005-06-07 2006-12-21 Sharp Corp Image forming apparatus
US20070022467A1 (en) 2005-07-22 2007-01-25 Walter Filbrich Method and system for limiting access to a shared network device
US7170623B2 (en) 2001-04-06 2007-01-30 Canon Kabushiki Kaisha Transferring print data between print management apparatuses
US20070041045A1 (en) 2005-08-05 2007-02-22 Tomoya Sato Information processing apparatus, information processing method, and program
JP2007055022A (en) 2005-08-23 2007-03-08 Canon Inc Printing apparatus
US20070091360A1 (en) 2005-10-26 2007-04-26 Canon Kabushiki Kaisha Information processing apparatus and print control method
US7224477B2 (en) 2000-08-28 2007-05-29 Seiko Epson Corporation Printer and printing system capable of high secret printing
JP2007140916A (en) 2005-11-18 2007-06-07 Fuji Xerox Co Ltd Printing system; and processing method and program of electronic document in this system
US20070133044A1 (en) 2005-12-12 2007-06-14 Canon Kabushiki Kaisha Data processing apparatus, image processing apparatus, print job production method, and print job output method
US20070139695A1 (en) 2005-12-21 2007-06-21 Xerox Corporation User interface, printing system and method of processing print jobs
US20070146768A1 (en) 2005-12-27 2007-06-28 Takashi Isoda Information processing method and apparatus thereof
JP2007176082A (en) 2005-12-28 2007-07-12 Ricoh Co Ltd Image formation apparatus and image formation method
JP2007188477A (en) 2005-12-12 2007-07-26 Canon Inc Data processing device, image processor, print job generation method, print job output method, program, and storage medium
US20070177920A1 (en) 2006-02-01 2007-08-02 Seiichi Katano Approach for implementing locked printing on printing devices
JP2007241939A (en) 2006-03-13 2007-09-20 Ricoh Co Ltd Image forming apparatus
JP2007290396A (en) 2006-04-25 2007-11-08 Ricoh Co Ltd Printing device having locked printing process
JP2007304931A (en) 2006-05-12 2007-11-22 Kyocera Mita Corp Print system, print method and print processing program
US20080030772A1 (en) 2006-08-03 2008-02-07 Canon Kabushiki Kaisha Information processing apparatus and print device control method
US20080037052A1 (en) 2006-08-09 2008-02-14 Konica Minolta Business Technologies, Inc. Electronic document management device, electronic document management method, recording medium recording electronic document management program, and recording medium recording program for creating electronic document
JP2008040981A (en) 2006-08-09 2008-02-21 Fuji Xerox Co Ltd Program for printing, electronic equipment and control method of electronic equipment
US20080066185A1 (en) 2006-09-12 2008-03-13 Adobe Systems Incorporated Selective access to portions of digital content
JP2008097115A (en) 2006-10-06 2008-04-24 Fuji Xerox Co Ltd Printing system, printing apparatus and information processing apparatus
JP2008103867A (en) 2006-10-18 2008-05-01 Fuji Xerox Co Ltd Image processor and program
US20080114922A1 (en) 2006-11-13 2008-05-15 Dee Chou System and method for disabling access to non-volatile storage in a multi-function peripheral
US20080117452A1 (en) * 2006-11-22 2008-05-22 Computer Engineering & Consulting, Ltd. Secure Printing System and Method for the Same
US20080189598A1 (en) 2007-02-07 2008-08-07 Hajime Yoshida Electronic filing system
US20080201784A1 (en) 2002-12-11 2008-08-21 Ravi Someshwar Methods and apparatus for secure document printing
US20090147698A1 (en) 2007-12-06 2009-06-11 Telefonaktiebolaget Lm Ericsson (Publ) Network automatic discovery method and system
US20090244595A1 (en) 2008-03-31 2009-10-01 Seong Kim Approach For Processing Print Data Using Password Control Data
US20090244594A1 (en) 2008-03-31 2009-10-01 Jayasimha Nuggehalli Approach For Printing Policy-Enabled Electronic Documents Using Locked Printing
US20090244596A1 (en) 2008-03-31 2009-10-01 Seiichi Katano Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
US7609412B2 (en) 2000-12-28 2009-10-27 Ricoh Company, Ltd. Printing system, printing apparatus and terminal apparatus employed in printing system, and printing method
US20090316183A1 (en) 2008-06-23 2009-12-24 Ke Wei Performance Of A Locked Print Architecture
US20100002249A1 (en) 2008-07-02 2010-01-07 Jayasimha Nuggehalli Locked Print With Intruder Detection And Management
US7660803B2 (en) 2004-09-20 2010-02-09 Samsung Electronics Co., Ltd. Policy-based management method and system for printing of extensible markup language (XML) documents
US7667865B2 (en) 2006-02-06 2010-02-23 Xerox Corporation Mobile device-enabled secure release of print jobs
US7697760B2 (en) 2001-02-22 2010-04-13 International Business Machines Corporation Handwritten word recognition using nearest neighbor techniques that allow adaptive learning
US7797328B2 (en) 2004-12-21 2010-09-14 Thomas Lane Styles System and method of searching for story-based media
US20100253968A1 (en) 2009-04-03 2010-10-07 Jayasimha Nuggehalli Approach for displaying cost data for locked print data at printing devices
US20100265529A1 (en) 2009-04-15 2010-10-21 Seiichi Katano Control for display of multiple versions of a printable document for locked print
US20110013219A1 (en) 2009-07-16 2011-01-20 Jayasimha Nuggehalli System, method and apparatus of forwarding a print job using a job ticket
US20120140264A1 (en) 2007-04-20 2012-06-07 Jayasimha Nuggehalli Approach For Implementing Locked Printing With Unlock Via A User Input Device
US8302205B2 (en) 2003-06-23 2012-10-30 Ricoh Company, Ltd. Access control decision system, access control enforcing system, and security policy
US20130083363A1 (en) 2007-01-22 2013-04-04 Ricoh Company, Ltd. Fault tolerant printing system

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH04235667A (en) 1991-01-10 1992-08-24 Koufu Nippon Denki Kk Device for issuing certificate or the like
JP3363470B2 (en) * 1992-02-10 2003-01-08 キヤノン株式会社 Print control apparatus and method
JPH0695464A (en) 1992-09-11 1994-04-08 Fuji Xerox Co Ltd Image processor
JP3260857B2 (en) 1992-10-30 2002-02-25 株式会社リコー Image processing device
DE10335468A1 (en) 2003-08-02 2005-02-17 Fischerwerke Artur Fischer Gmbh & Co. Kg Anchor bolt for use in soft or porous materials has conical nut on its lower end which spreads fins on sleeve fitted above it on bolt
US20050149744A1 (en) * 2003-12-29 2005-07-07 Intel Corporation Network processor having cryptographic processing including an authentication buffer
DE102005059214B4 (en) * 2005-12-12 2007-10-25 Eurofilters N.V. Filter bag for a vacuum cleaner
JP6152814B2 (en) 2014-03-25 2017-06-28 株式会社豊田自動織機 Battery monitoring device

Patent Citations (163)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0695464B2 (en) 1983-03-30 1994-11-24 イ−・アイ・デユポン・ド・ネモア−ス・アンド・コンパニ− Electric filter connector
EP0657845A2 (en) 1993-12-01 1995-06-14 Canon Kabushiki Kaisha Apparatus and method for printing confidential data
US5633932A (en) 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
US5845066A (en) 1996-03-25 1998-12-01 Mitsubishi Denki Kabushiki Kaisha Security system apparatus for a memory card and memory card employed therefor
US5880447A (en) 1996-07-02 1999-03-09 Ibm Japan, Ltd. Data output controller and data output system using this output controller
JPH10207660A (en) 1997-01-24 1998-08-07 Ricoh Co Ltd Printing system
US5970218A (en) 1997-02-11 1999-10-19 Toshiba America Information Systems, Inc. Private print
US6614546B1 (en) 1997-03-10 2003-09-02 Minolta Co., Ltd. Image processing system and image forming apparatus
JPH11191043A (en) 1997-12-26 1999-07-13 Canon Inc Print system and data processing method thereof, and storage medium stored with computer-readable program
US7079269B2 (en) 1998-03-19 2006-07-18 Océ-Technologies B.V. Interactive printing with a plurality of printer devices
US20010038462A1 (en) 1998-03-19 2001-11-08 Teeuwen Peter Johannes Hendrikus Maria Interactive printing with a plurality of printer devices
US6161139A (en) * 1998-07-10 2000-12-12 Encommerce, Inc. Administrative roles that govern access to administrative functions
WO2000068817A1 (en) 1999-05-12 2000-11-16 Hewlett-Packard Company Generalized resource server
US6880124B1 (en) 1999-06-04 2005-04-12 Hewlett-Packard Development Company, L.P. Methods of storing and retrieving information, and methods of document retrieval
US6735665B1 (en) 1999-07-19 2004-05-11 Minolta Co., Ltd. Data processing device for specifying data storage information on a portable recording medium
US20040169884A1 (en) 1999-08-31 2004-09-02 Brother Kogyo Kabushiki Kaisha Printing system including a printer and client devices connected by a network
JP2001067201A (en) 1999-08-31 2001-03-16 Canon Inc Picture processing system and picture processor, and method for controlling the system, and method for controlling the device
US6862583B1 (en) 1999-10-04 2005-03-01 Canon Kabushiki Kaisha Authenticated secure printing
EP1091275B1 (en) 1999-10-04 2008-11-26 Canon Kabushiki Kaisha Authenticated secure printing
JP2001125982A (en) 1999-10-29 2001-05-11 Casio Comput Co Ltd Contents distribution system, server, output device and charging system
JP2001217948A (en) 2000-02-01 2001-08-10 Brother Ind Ltd Electronic device and image forming device
US6973671B1 (en) 2000-02-24 2005-12-06 International Business Machines Corporation Secure access to a unified logon-enabled data store
JP2002007095A (en) 2000-03-29 2002-01-11 Canon Inc Data processor and its control method
EP1143695A3 (en) 2000-03-29 2004-01-21 Canon Kabushiki Kaisha Control method for image processing apparatus connectable to computer network
US20010029521A1 (en) 2000-03-29 2001-10-11 Hiroshi Matsuda Control method for image processing apparatus connectable to computer network
US20020023143A1 (en) 2000-04-11 2002-02-21 Stephenson Mark M. System and method for projecting content beyond firewalls
US20020002503A1 (en) 2000-04-27 2002-01-03 Kenji Matsuoka Business method by internet connection information registration service, internet connection setting method, internet connection information registration method, and computer-readable recording medium which records application program
US6938154B1 (en) 2000-06-19 2005-08-30 Xerox Corporation System, method and article of manufacture for a cryptographic key infrastructure for networked devices
US20020021902A1 (en) 2000-07-24 2002-02-21 Yuichi Hosoda Image recording device, image input device, and data processor, image recording method, and storage medium recording image record control program
US20020054333A1 (en) 2000-07-31 2002-05-09 Kosuke Yamamoto Information processing apparatus, print time informing method, and computer-readable memory medium storing program therein
US7224477B2 (en) 2000-08-28 2007-05-29 Seiko Epson Corporation Printer and printing system capable of high secret printing
US20020041394A1 (en) 2000-10-05 2002-04-11 Satoshi Aoki Printing system using a portable terminal and method for imposing a printing charge
US20020059322A1 (en) 2000-10-19 2002-05-16 Takao Miyazaki Electronic image display device and printing system therefor
US7110541B1 (en) 2000-11-28 2006-09-19 Xerox Corporation Systems and methods for policy based printing
US6970259B1 (en) 2000-11-28 2005-11-29 Xerox Corporation Systems and methods for forgery detection and deterrence of printed documents
JP2002199153A (en) 2000-12-05 2002-07-12 Oce Technologies Bv Scan and print processing in network system having a plurality of devices
EP1229724A3 (en) 2000-12-05 2003-11-05 Océ-Technologies B.V. Interactive printing with a plurality of printer devices
EP1229724A2 (en) 2000-12-05 2002-08-07 Océ-Technologies B.V. Interactive printing with a plurality of printer devices
JP2002175241A (en) 2000-12-06 2002-06-21 Fuji Xerox Co Ltd Document providing device, printed document providing system and printing service method
US7609412B2 (en) 2000-12-28 2009-10-27 Ricoh Company, Ltd. Printing system, printing apparatus and terminal apparatus employed in printing system, and printing method
US7002703B2 (en) 2001-01-18 2006-02-21 Hewlett-Packard Development Company, L.P. Automatic download to print job retention
US20020097431A1 (en) 2001-01-22 2002-07-25 Munemitsu Ikegami Printing system and method restricting functions of printers, usable by each user
US7382487B2 (en) 2001-01-22 2008-06-03 Ricoh Company, Ltd. Printing system and method restricting functions of printers, usable by each user
US20020120855A1 (en) 2001-01-31 2002-08-29 Wiley Anthony J. Mechanism for controlling if/when material can be printed on a specific printer
US7697760B2 (en) 2001-02-22 2010-04-13 International Business Machines Corporation Handwritten word recognition using nearest neighbor techniques that allow adaptive learning
US7170623B2 (en) 2001-04-06 2007-01-30 Canon Kabushiki Kaisha Transferring print data between print management apparatuses
JP2002312146A (en) 2001-04-10 2002-10-25 Fuji Xerox Co Ltd Client device and network printing system
US20030044009A1 (en) 2001-08-31 2003-03-06 Sridhar Dathathraya System and method for secure communications with network printers
US20030065404A1 (en) 2001-09-20 2003-04-03 Bhatti Kristen L. Apparatus and method for controlling stored jobs
US20050229189A1 (en) 2001-10-22 2005-10-13 Mcmanus Eamonn Inter-process communication using different programming languages
US20030090697A1 (en) 2001-11-09 2003-05-15 Hewlett-Packard Co. Printer that redirects jobs to buddy printer
US20030090696A1 (en) 2001-11-13 2003-05-15 Willis Keith L. Systems and methods for controlling an image forming system based on customer replaceable unit status
US20040239992A1 (en) 2002-01-10 2004-12-02 Brother Kogyo Kabushiki Kaisha Information processing device, network printing system, and computer program
EP1367814A3 (en) 2002-05-27 2005-06-08 Océ-Technologies B.V. Processing of a digital mixed colour document
US20050039044A1 (en) 2002-06-17 2005-02-17 Kazuhito Gassho Printer server and print system and data receiving device and data sending/receiving system
US20040019671A1 (en) 2002-07-29 2004-01-29 Metz James Michael Network management tool for maintaining printing device information
US20040125402A1 (en) 2002-09-13 2004-07-01 Yoichi Kanai Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy
US20090185223A1 (en) 2002-09-13 2009-07-23 Yoichi Kanai Document printing program, document protecting program, document protecting system, document printing apparatus for printing out a document based on security policy
US20040056889A1 (en) 2002-09-23 2004-03-25 Seiichi Katano Multi-function peripheral
US20040090652A1 (en) 2002-10-22 2004-05-13 Yoon Tae-Jung Printer, and control method thereof, having extended communication interface functions
US20040088378A1 (en) 2002-11-04 2004-05-06 Moats Travis N. Method and system for viewing stored print jobs through an embedded web server interface
US20040095595A1 (en) 2002-11-20 2004-05-20 Jacobsen Dana A. Device and method for securing print jobs stored on a printer
JP2004181647A (en) 2002-11-29 2004-07-02 Seiko Epson Corp Printer with alternative print function
US20080201784A1 (en) 2002-12-11 2008-08-21 Ravi Someshwar Methods and apparatus for secure document printing
US20040118911A1 (en) 2002-12-14 2004-06-24 Ncr Corporation Self service terminal
JP2004221979A (en) 2003-01-15 2004-08-05 Kyocera Mita Corp Image forming device
US20040140611A1 (en) 2003-01-21 2004-07-22 Mui Paul K. Multifunction output tray for printer and paper handling device
US20040159783A1 (en) 2003-01-27 2004-08-19 Ciphergen Biosystems, Inc. Data management system and method for processing signals from sample spots
US20040156068A1 (en) * 2003-02-10 2004-08-12 Sharp Kabushiki Kaisha Data processing apparatus
US7450260B2 (en) 2003-03-20 2008-11-11 Ricoh Company, Ltd. Printer driver program and printer
JP2004287824A (en) 2003-03-20 2004-10-14 Ricoh Co Ltd Printer driver program and printer
EP1465052A2 (en) 2003-04-01 2004-10-06 Seiko Epson Corporation Document sharing service for network printing
US20040196492A1 (en) 2003-04-01 2004-10-07 International Business Machines Corporation System and method for controlling a remote printer
US7359076B2 (en) 2003-04-01 2008-04-15 Seiko Epson Corporation Document sharing service for network printing
US20040257613A1 (en) 2003-04-02 2004-12-23 Hiroki Okabe Print job management apparatus and print job management method
US20040257601A1 (en) 2003-05-29 2004-12-23 Canon Kabushiki Kaisha Image forming apparatus
US20040246515A1 (en) 2003-06-03 2004-12-09 Sharp Laboratories Of America, Inc. System and method for delivering native structure document printing instructions
US20040263870A1 (en) 2003-06-20 2004-12-30 Masanori Itoh Method and apparatus for providing a service for sharing a printing environment
US8302205B2 (en) 2003-06-23 2012-10-30 Ricoh Company, Ltd. Access control decision system, access control enforcing system, and security policy
US20050030151A1 (en) 2003-08-07 2005-02-10 Abhishek Singh Secure authentication of a user to a system and secure operation thereafter
EP1511287A3 (en) 2003-08-27 2005-10-12 Matsushita Electric Industrial Co., Ltd Network scanner with incorporated multifunction machine
JP2005074772A (en) 2003-08-29 2005-03-24 Kyocera Mita Corp Printing device and method
US20050046876A1 (en) 2003-08-29 2005-03-03 Burget Art H. Method and system for controlling access of clients and users to a print server
JP2005092731A (en) 2003-09-19 2005-04-07 Fuji Xerox Co Ltd Online print management system and method, offline job restoring device, offline job generating device, and printer driver
US20050068547A1 (en) 2003-09-29 2005-03-31 Canon Kabushiki Kaisha Print processing apparatus, print processing method, system control method, program, and storage medium
US20050149755A1 (en) 2003-10-23 2005-07-07 Toshihiro Shima Printer and print system
US20050094195A1 (en) 2003-11-04 2005-05-05 Matsushita Electric Industrial Co., Ltd. Multifunction apparatus and user authentication method
US20050152543A1 (en) 2003-11-04 2005-07-14 Toshihiro Shima Printer and print system
US20050100378A1 (en) 2003-11-12 2005-05-12 Canon Kabushiki Kaisha Print apparatus, print system, print method, job processing method, storage medium, and program
US20050154884A1 (en) 2003-11-27 2005-07-14 Oce-Technologies B.V. Secure data transmission in a network system of image processing devices
US20050141013A1 (en) 2003-12-03 2005-06-30 Canon Kabushiki Kaisha Redirect-on-error print system, information processing apparatus, control method, and control program
JP2005196741A (en) 2003-12-10 2005-07-21 Canon Inc Information processing device, method, and program
JP2005178070A (en) 2003-12-17 2005-07-07 Canon Inc Printing processing system
US20050210253A1 (en) 2004-01-30 2005-09-22 Canon Kabushiki Kaisha Secure communication method, terminal device, authentication server, computer program, and computer-readable recording medium
US20050168769A1 (en) 2004-01-31 2005-08-04 Samsung Electronics Co., Ltd. Security print system and method
JP2005225099A (en) 2004-02-13 2005-08-25 Oki Data Corp Printing device
US20050182822A1 (en) 2004-02-17 2005-08-18 Daniel Stuart W. Imaging device with memory device interface
US20050183141A1 (en) 2004-02-18 2005-08-18 Nozomi Sawada Image forming apparatus, information processing apparatus, information processing system, authentication method and computer-readable storage medium
US20050182508A1 (en) 2004-02-18 2005-08-18 Brother Kogyo Kabushiki Kaisha Image editing device and print/embroidery data creating device
EP1566719A2 (en) 2004-02-18 2005-08-24 Ricoh Company, Ltd. Image forming apparatus, information processing apparatus, information processing system, authentication method and computer-readable storage medium
US20050213136A1 (en) 2004-03-29 2005-09-29 Hideo Noyama Print management system
US20050254086A1 (en) 2004-05-14 2005-11-17 Hiroki Shouno Job display control method
US20050273852A1 (en) 2004-05-24 2005-12-08 Sharp Laboratories Of America, Inc. Imaging job authorization
US20050268089A1 (en) 2004-05-25 2005-12-01 Samsung Electronics Co., Ltd. Printing system and method that support security function
US20050273843A1 (en) 2004-06-02 2005-12-08 Canon Kabushiki Kaisha Encrypted communication method and system
US20050276618A1 (en) 2004-06-09 2005-12-15 International Business Machines Corporation Method and system for managing print jobs for a printer to maximize throughput
US20060017954A1 (en) 2004-07-22 2006-01-26 Ly An V System and method for normalizing job properties
EP1621994A1 (en) 2004-07-29 2006-02-01 Océ-Technologies B.V. A method for printing a digital print file and a printer adapted for applying the said method
US20060028672A1 (en) 2004-08-04 2006-02-09 Canon Kabushiki Kaisha Process control system, process control server and process control method
US20060044589A1 (en) 2004-08-26 2006-03-02 Shuichi Nakagawaji Printing device and method for printing
US20060044607A1 (en) 2004-08-31 2006-03-02 Canon Kabushiki Kaisha Document providing system and document management server
US8130392B2 (en) 2004-08-31 2012-03-06 Canon Kabushiki Kaisha Document providing system and document management server
US7660803B2 (en) 2004-09-20 2010-02-09 Samsung Electronics Co., Ltd. Policy-based management method and system for printing of extensible markup language (XML) documents
US20060112270A1 (en) 2004-11-19 2006-05-25 Konica Minolta Systems Laboratory, Inc. Password encrypting apparatus and method for encrypting password
US7797328B2 (en) 2004-12-21 2010-09-14 Thomas Lane Styles System and method of searching for story-based media
JP2006205374A (en) 2005-01-25 2006-08-10 Canon Inc Printing device and information processing device
JP2006227908A (en) 2005-02-17 2006-08-31 Seiko Epson Corp Print commanding device, print executing device, print command and print executing system, and method therefor, and program
JP2006231675A (en) 2005-02-24 2006-09-07 Canon Inc Printing processing apparatus
JP2006252142A (en) 2005-03-10 2006-09-21 Ricoh Co Ltd Information management device, information management method, program making computer execute this method, and recording medium
US20060268315A1 (en) 2005-05-20 2006-11-30 Xerox Corporation Systems and method for controlling hide and hold jobs in a network
JP2006341404A (en) 2005-06-07 2006-12-21 Sharp Corp Image forming apparatus
US20060279768A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
US20120002234A1 (en) 2005-06-08 2012-01-05 Sam Wang Approach For Securely Printing Electronic Documents
US20060279761A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
US20060279760A1 (en) 2005-06-08 2006-12-14 Sam Wang Approach for securely printing electronic documents
US20070022467A1 (en) 2005-07-22 2007-01-25 Walter Filbrich Method and system for limiting access to a shared network device
US20070041045A1 (en) 2005-08-05 2007-02-22 Tomoya Sato Information processing apparatus, information processing method, and program
JP2007055022A (en) 2005-08-23 2007-03-08 Canon Inc Printing apparatus
US20070091360A1 (en) 2005-10-26 2007-04-26 Canon Kabushiki Kaisha Information processing apparatus and print control method
JP2007140916A (en) 2005-11-18 2007-06-07 Fuji Xerox Co Ltd Printing system; and processing method and program of electronic document in this system
US20070133044A1 (en) 2005-12-12 2007-06-14 Canon Kabushiki Kaisha Data processing apparatus, image processing apparatus, print job production method, and print job output method
JP2007188477A (en) 2005-12-12 2007-07-26 Canon Inc Data processing device, image processor, print job generation method, print job output method, program, and storage medium
US20070139695A1 (en) 2005-12-21 2007-06-21 Xerox Corporation User interface, printing system and method of processing print jobs
US20070146768A1 (en) 2005-12-27 2007-06-28 Takashi Isoda Information processing method and apparatus thereof
JP2007176082A (en) 2005-12-28 2007-07-12 Ricoh Co Ltd Image formation apparatus and image formation method
US20070177920A1 (en) 2006-02-01 2007-08-02 Seiichi Katano Approach for implementing locked printing on printing devices
JP2007203736A (en) 2006-02-01 2007-08-16 Ricoh Co Ltd Method for executing locked printing in printing device
US7667865B2 (en) 2006-02-06 2010-02-23 Xerox Corporation Mobile device-enabled secure release of print jobs
JP2007241939A (en) 2006-03-13 2007-09-20 Ricoh Co Ltd Image forming apparatus
JP2007290396A (en) 2006-04-25 2007-11-08 Ricoh Co Ltd Printing device having locked printing process
JP2007304931A (en) 2006-05-12 2007-11-22 Kyocera Mita Corp Print system, print method and print processing program
US20080030772A1 (en) 2006-08-03 2008-02-07 Canon Kabushiki Kaisha Information processing apparatus and print device control method
US20080037052A1 (en) 2006-08-09 2008-02-14 Konica Minolta Business Technologies, Inc. Electronic document management device, electronic document management method, recording medium recording electronic document management program, and recording medium recording program for creating electronic document
JP2008040981A (en) 2006-08-09 2008-02-21 Fuji Xerox Co Ltd Program for printing, electronic equipment and control method of electronic equipment
US20080066185A1 (en) 2006-09-12 2008-03-13 Adobe Systems Incorporated Selective access to portions of digital content
JP2008097115A (en) 2006-10-06 2008-04-24 Fuji Xerox Co Ltd Printing system, printing apparatus and information processing apparatus
JP2008103867A (en) 2006-10-18 2008-05-01 Fuji Xerox Co Ltd Image processor and program
US20080114922A1 (en) 2006-11-13 2008-05-15 Dee Chou System and method for disabling access to non-volatile storage in a multi-function peripheral
US20080117452A1 (en) * 2006-11-22 2008-05-22 Computer Engineering & Consulting, Ltd. Secure Printing System and Method for the Same
US20130083363A1 (en) 2007-01-22 2013-04-04 Ricoh Company, Ltd. Fault tolerant printing system
US20080189598A1 (en) 2007-02-07 2008-08-07 Hajime Yoshida Electronic filing system
US8363243B2 (en) 2007-04-20 2013-01-29 Ricoh Company, Ltd. Approach for implementing locked printing with unlock via a user input device
US20130169991A1 (en) 2007-04-20 2013-07-04 Ricoh Company, Ltd. Approach For Implementing Locked Printing With Unlock Via A User Input Device
US20120140264A1 (en) 2007-04-20 2012-06-07 Jayasimha Nuggehalli Approach For Implementing Locked Printing With Unlock Via A User Input Device
US20090147698A1 (en) 2007-12-06 2009-06-11 Telefonaktiebolaget Lm Ericsson (Publ) Network automatic discovery method and system
US20090244595A1 (en) 2008-03-31 2009-10-01 Seong Kim Approach For Processing Print Data Using Password Control Data
US20090244596A1 (en) 2008-03-31 2009-10-01 Seiichi Katano Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
US20090244594A1 (en) 2008-03-31 2009-10-01 Jayasimha Nuggehalli Approach For Printing Policy-Enabled Electronic Documents Using Locked Printing
US20090316183A1 (en) 2008-06-23 2009-12-24 Ke Wei Performance Of A Locked Print Architecture
US20100002249A1 (en) 2008-07-02 2010-01-07 Jayasimha Nuggehalli Locked Print With Intruder Detection And Management
US20100253968A1 (en) 2009-04-03 2010-10-07 Jayasimha Nuggehalli Approach for displaying cost data for locked print data at printing devices
US20100265529A1 (en) 2009-04-15 2010-10-21 Seiichi Katano Control for display of multiple versions of a printable document for locked print
US20110013219A1 (en) 2009-07-16 2011-01-20 Jayasimha Nuggehalli System, method and apparatus of forwarding a print job using a job ticket

Non-Patent Citations (58)

* Cited by examiner, † Cited by third party
Title
Claims, European patent application 07250426.9-1245, 2 pages.
European Patent Office, European Search Report, application No. EP 09 15 6660, dated Jul. 6, 2009, 7 pages.
European Patent Office, European Search Report, application No. EP 09156641, dated Jul. 2, 2009, 8 pages.
European Patent Office, European Search Report, EP application No. EP 07252112, dated Mar. 1, 2010, 6 pages.
European Patent Office, European Search Report, European patent application 07250426.9-1245, dated Jun. 12, 2008, 19 pages.
European Patent Office, European Search Report, European patent application EP 08 16 0705, dated Nov. 12, 2008, 10 pages.
European Patent Office, European Search Report, in application No. 09164263.7, dated May 4, 2012, 6 pages.
European Patent Office, Office Action in application No. 07 252 112.3-1959, dated Nov. 28, 2013, 5 pages.
European Patent Office, Search Report in application No. 08 153 757.3-1870, dated Mar. 22, 2016, 4 pages.
European Patent Office, Search Report in application No. 09 156 660.4, dated Sep. 18, 2013, 6 pages.
U.S. Appl. No. 11/656,592, filed Jan. 22, 2007, Final Office Action, Feb. 28, 2012.
U.S. Appl. No. 11/788,517, filed Apr. 20, 2007, Office Action, Oct. 3, 2011.
U.S. Appl. No. 11/880,359, filed Jul. 20, 2007, Final Office Action, Nov. 29, 2011.
U.S. Appl. No. 11/880,359, filed Jul. 20, 2007, Office Action, Apr. 4, 2012.
U.S. Appl. No. 12/059,836, filed Mar. 31, 2008, Notice of Allowance, Feb. 26, 2014.
U.S. Appl. No. 12/059,836, filed Mar. 31, 2008, Office Action, Jul. 19, 2013.
U.S. Appl. No. 12/059,836, filed Mar. 31, 2008, Office Action, Mar. 25, 2013.
U.S. Appl. No. 12/059,836, filed Mar. 31, 2008, Office Action, Oct. 29, 2013.
U.S. Appl. No. 12/059,896, filed Mar. 31, 2008, Notice of Allowance, Dec. 31, 2015.
U.S. Appl. No. 12/059,916, filed Mar. 31, 2008, Examiners Answer, Jun. 23, 2014.
U.S. Appl. No. 12/059,916, filed Mar. 31, 2008, Final Office Action, Jul. 24, 2013.
U.S. Appl. No. 12/059,916, filed Mar. 31, 2008, Final Office Action, Nov. 4, 2013.
U.S. Appl. No. 12/059,916, filed Mar. 31, 2008, Office Action, Mar. 15, 2012.
U.S. Appl. No. 12/059,916, filed Mar. 31, 2008, Office Action, Mar. 25, 2013.
U.S. Appl. No. 12/059,986, filed Mar. 31, 2008, Advisory Action, Dec. 6, 2012.
U.S. Appl. No. 12/059,986, filed Mar. 31, 2008, Examiner's Answers, Jul. 23, 2013.
U.S. Appl. No. 12/059,986, filed Mar. 31, 2008, Final Office Action, Sep. 24, 2012.
U.S. Appl. No. 12/059,986, filed Mar. 31, 2008, Office Action, Mar. 15, 2012.
U.S. Appl. No. 12/144,549, filed Jun. 23, 2008, Notice of Allowance, Mar. 5, 2012.
U.S. Appl. No. 12/144,549, filed Jun. 23, 2008, Office Action, Nov. 7, 2011.
U.S. Appl. No. 12/166,999, filed Jul. 2, 2008, Advisory Action, Mar. 18, 2013.
U.S. Appl. No. 12/166,999, Jul. 2, 2008, Examiners Answers, Dec. 18, 2013.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Decision on Appeal Brief, May 30, 2014.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Examiner's Answer, Oct. 29, 2014.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Final Office Action, Apr. 23, 2015.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Final Office Action, Jun. 15, 2012.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Interview Summary, Nov. 19, 2015.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Interview Summary, Sep. 6, 2012.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Office Action, Jan. 11, 2012.
U.S. Appl. No. 12/417,846, filed Apr. 3, 2009, Office Action, Mar. 4, 2014.
U.S. Appl. No. 12/423,933, filed Apr. 14, 2009, Office Action, Jun. 21, 2012.
U.S. Appl. No. 12/423,933, filed Apr. 15, 2009, Notice of Allowance, Dec. 21, 2012.
U.S. Appl. No. 12/423,933, filed Apr. 15, 2009, Office Action, Dec. 8, 2011.
U.S. Appl. No. 13/230,541, filed Sep. 12, 2011, Notice of Allowance, Jun. 21, 2013.
U.S. Appl. No. 13/230,541, filed Sep. 12, 2011, Office Action, Nov. 25, 2011.
U.S. Appl. No. 13/230,541, filed Sep. 21, 2011, Final Office Action, Apr. 25, 2012.
U.S. Appl. No. 13/396,401, filed Feb. 14, 2012, Office Action, May 7, 2012.
U.S. Appl. No. 13/531,249, filed Jun. 22, 2012, Final Office Action, Nov. 9, 2012.
U.S. Appl. No. 13/531,249, filed Jun. 22, 2012, Notice of Allowance, Aug. 28, 2013.
U.S. Appl. No. 13/531,249, filed Jun. 22, 2012, Office Action, Aug. 10, 2012.
U.S. Appl. No. 13/531,249, Jun. 22, 2012, Office Action, Apr. 17, 2013.
U.S. Appl. No. 13/633,046, filed Oct. 1, 2012, Final Office Action, Aug. 22, 2014.
U.S. Appl. No. 13/633,046, filed Oct. 1, 2012, Final Office Action, Nov. 1, 2013.
U.S. Appl. No. 13/633,046, filed Oct. 1, 2012, Office Action, Apr. 11, 2013.
U.S. Appl. No. 13/633,046, filed Oct. 1, 2012, Office Action, Feb. 20, 2014.
U.S. Appl. No. 13/753,133, filed Jan. 29, 2013, Final Office Action, Oct. 22, 2013.
U.S. Appl. No. 13/753,133, filed Jan. 29, 2013, Notice of Allowance, Jan. 30, 2014.
U.S. Appl. No. 13/753,133, filed Jan. 29, 2013, Office Action, May 21, 2013.

Also Published As

Publication number Publication date
US9729758B2 (en) 2017-08-08
EP2141631A3 (en) 2012-05-30
EP2141631A2 (en) 2010-01-06
JP2010012785A (en) 2010-01-21
US20100002249A1 (en) 2010-01-07
US20160316105A1 (en) 2016-10-27
US9894246B2 (en) 2018-02-13
US20170104891A1 (en) 2017-04-13

Similar Documents

Publication Publication Date Title
US9729758B2 (en) Locked print with intruder detection and management
US8107103B2 (en) Print driver for printing policy-enabled electronic documents using locked printing
US8797563B2 (en) Approach for printing policy-enabled electronic documents using locked printing
US9513857B2 (en) Approach for processing print data using password control data
US8115951B2 (en) Approach for implementing locked printing with unlock via a user input device
US9311031B2 (en) Approach for printing policy-enabled electronic documents using locked printing and a shared memory data structure
US7249900B1 (en) Approach for implementing locked printing on printing devices
US8031349B2 (en) Approach for securely printing electronic documents
US8547568B2 (en) Approach for securely printing electronic documents
US8264715B2 (en) Approach for implementing locked printing with remote unlock on printing devices
US7808664B2 (en) Approach for securely printing electronic documents
US8844014B2 (en) Managing access to a document-processing device using an identification token
US8111413B2 (en) Approach for securely printing policy-enabled electronic documents based on print driver and printing device support

Legal Events

Date Code Title Description
AS Assignment

Owner name: RICOH COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NUGGEHALLI, JAYASIMHA;KATANO, SEIICHI;KIM, SEONG;AND OTHERS;SIGNING DATES FROM 20080620 TO 20080702;REEL/FRAME:021248/0278

Owner name: RICOH COMPANY, LTD., JAPAN

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:NUGGEHALLI, JAYASIMHA;KATANO, SEIICHI;KIM, SEONG;AND OTHERS;REEL/FRAME:021248/0278;SIGNING DATES FROM 20080620 TO 20080702

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8